Search Results - (( construct information needs algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…Our enhanced algorithm features a good locality properties since it need only 2-hop neighborhood information within each node. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Construction and optimization of financial risk management model based on financial data and text data influencing information system by Hui Huang, Thien Sang Lim

    Published 2024
    “…Textual data insights can great lyimpact risk assessment results, although most risk management systems focus on quantitative financial assessments. This research constructs and enhances information system financial risk management models employing financial and textual data, including MD&A narratives, to fill this gap. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir

    Published 2016
    “…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
    Get full text
    Get full text
    Book Section
  9. 9

    A flexible query transformation framework for structured retrieval / Gan Keng Hoon by Gan, Keng Hoon

    Published 2013
    “…The framework is also able to represent various kinds of information needs and structured query languages with its proposed intermediate query representation. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An ensemble data summarization approach based on feature transformation to learning relational data by Chung, Seng Kheau

    Published 2015
    “…The Information Gain borrowed from Information Retrieval theory and Term-term Correlation algorithm are used to determine the relevancy of these features to be selected or merged in order to form a new generation of TF-IDF vector space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…However, vital information can be hacked or interrupted during an active transmission over the Internet; therefore, the need for information security is paramount. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir by Md Nasir, Syerina Azlin

    Published 2016
    “…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Iterative methods for solving split common fixed point problems in Hilbert spaces by Mohammed, Lawan Bulama

    Published 2016
    “…In this regard, we consider an algorithm for solving such a problem which does not need any prior information on the norm of the bounded linear operator and establish the convergence results of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…The key results that were found during the project is that it is possible to find the semantic features with the system can produce results based on the text meaning such as the system. With this information the system is able to produce results that can gives the user some useful information which can contribute in the later construction of khutbah texts. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…Those processes constructed MCCTreeGenerator algorithm which will produce the same subtree as MCCTree but difference in its structure. …”
    Get full text
    Get full text
    Thesis