Search Results - (( developing development formal algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development formal »
- implication based »
- formal algorithm »
- java implication »
-
1
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…However, the focus of the paper is on a method proposed to extract adjacency matrix from concepts obtained from the theory of Formal Concept Analysis (FCA) using two consecutive algorithms called the Relatedness Algorithm and Adjacency Matrix Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…In addition, the improved WOA is developed by using Cauchy mutation and local search algorithm to solve its local optima problem and improve population diversity. …”
Get full text
Get full text
Get full text
Thesis -
3
Gym activities recommender system using content based filtering algorithm / Muhammad Siddiq Sa’idin
Published 2025“…The research adopts a formal methodology which combines gym activity dataset compilation and systematic design of the system with algorithm development and performance assessment.…”
Get full text
Get full text
Thesis -
4
-
5
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
6
-
7
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…Therefore, it is essential to determine control system safety in advance by verifying the possibility of state transitions from safe to unsafe states at the design and development stage. To overcome these issues, many researchers and engineers have been involved in formal methods research. …”
Get full text
Get full text
Get full text
Technical Report -
8
Weighted Watson-crick automata and applications in halal authentication
Published 2016“…We mainly study the theoretical problems that include probabilistic and fuzzy variants such as the generative capacities, closure properties and complexity problems. We also construct formal models for food authentication processes and develop algorithms for the identification of non halal patterns in DNA molecules. …”
Get full text
Get full text
Monograph -
9
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
Get full text
Get full text
Thesis -
10
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
The design and implementation of a two and three-dimensional triangular irregular network based GIS
Published 2000“…All the developed algorithms and methods were tested using real data sets. …”
Get full text
Get full text
Get full text
Thesis -
12
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Solving ump examination timetabling problem using dynamic exploration step counting hill climbing algorithm
Published 2022“…The work starts by developing a formal mathematical model based on the new constraints and generates a feasible initial solution of the examination timetable that satisfies the hard and soft constraints (as much as possible). …”
Get full text
Get full text
Thesis -
14
The nonlinear fabry-perot resonator: direct numerical integration
Published 2001“…The optical polarization P, rather than the optical E field, is retained as the dynamical variable. We develop an algorithm for integration of the nonlinear wave equation in P and with addition of the nonlinear boundary conditions at the resonator surfaces we are able to find the transmission as a function of intensity and frequency. …”
Get full text
Get full text
Article -
15
A framework for classification software security using common vulnerabilities and exposures
Published 2018“…The main research aim is to investigate what information is necessary to make a formal vulnerability pattern representation.This is done through the usage of formal Backus-Naur-Form syntax for the execution and presented with newly created vulnerability flow diagram.Some future works were also proposed to further enhance the elements in the secured soft-ware process framework.This thesis focuses on the research and development of the design, formalization and translation of the vulnerability classification pattern through a framework using common vulnerabilities and exposures data.To achieve this aim, the following work was carried out.First step is to create and conceptualized necessary meta-process.Second step is to specify the relationship between the classifiers and vulnerability classification pat-terns. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…Currently, there is no ontology which is developed specify in metabolic pathway domain. Therefore, the main objective of this research is to develop an ontology-based representation for metabolic pathway to represent and to describe the concepts in the metabolic pathway domain and the relationships among them. …”
Get full text
Get full text
Thesis -
18
Current trends strategies in the test redundancy reduction
Published 2016“…Many strategies in a greedy approach have been developed (including GE, GRE, and HGS), Formal Concept Analysis and non-greedy approach (tReductLAHC, tReductSA) using Metaheuristic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman
Published 2010“…Petri net can be applied to event related process control in simulating, checking, debugging, and stating the quantitative deviations from the ideal solutions of any given continuous or discrete process as well as providing formal checking at all development stages from specification, design and implementation . …”
Get full text
Get full text
Thesis -
20
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. …”
Get full text
Get full text
Get full text
Article
