Search Results - (( based interactive stemming algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Web information retrieval (IR) interaction / Amirohaime Mahaidin by Mahaidin, Amirohaime

    Published 2008
    “…Web information interaction retrieves the relevant website to user and applied stemming algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Eye makeup system using interactive genetic algorithm by Chua,, Suk Ju.

    Published 2010
    “…Interaction is required for user to determine the fitness funct ions used in Genetic Algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…Comparisons between the MR and PR models of the case studies are analyzed based on the eight selection criteria (8SCs). Factors contributing to the stem volume estimation are identified as tree height (T) and diameter at base (Db) as main contributors, while diameter at the middle (Dm), breast height (Dbh) and top (Dt) are significant contributors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism by Surayaini Basri

    Published 2015
    “…The lack of works in building more effective algorithms in performing the stemming process, identifying misspelled words, and identifying neologism has affected the efficiency of retrieving relevant information or articles in Malay language. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…Student input initiates the process, with user interaction allowing for timetable customization based on personal preferences. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Modelling the yield loss of oil palm due to Ganoderma Basal Stem Rot disease by Assis Kamu

    Published 2016
    “…The identification of the main sources of multicollinearity was also performed based on correlation-based test and also variance-based test. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modelling the yield loss of oil palm due to ganoderma basal stem rot disease by Assis bin Kamu

    Published 2016
    “…The identification of the main sources of multicollinearity was also performed based on correlation-based test and also variance-based test. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Term Frequency-Inverse Document Frequency (TF-IDF) algorithm is performed for text search, where it satisfies multiple keywords at a time and the search result for review is based on relevancy score. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Computational Analysis of Gas Kinetic Bhatnagar-Grosskrook Scheme for Inviscid Compressible Flow by Ong, Jiunn Chit

    Published 2004
    “…Many numerical schemes have been developed in the field of computational fluid dynamics to simulate inviscid, compressible flows.Among those most notable and successful are the Godunov-type schemes and flux vector splitting schemes.Besides these numerical schemes, schemes based on the gas kinetic theory have been developed in the past few years.Stemming from this approach, the gas kinetic Bhatnagar-Gross-Krook (BGK) scheme is realized.In this thesis, the BGK scheme based on the BGK model of the approximate Boltzmann equation has been fully analyzed and developed accordingly.The numerical algorithms for the BGK scheme are first developed for simulating one-dimensional flow, and then follow by the-two dimensional flow realms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
    Get full text
    Get full text
    Thesis