Search Results - (( developing formative content algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- developing formative »
- formative content »
- content algorithm »
- java implication »
-
1
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
2
-
3
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
4
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The letter document has their own format, which consists of many parts. The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. …”
Get full text
Get full text
Research Reports -
5
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
6
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The letter document has their own format, which consists of many parts. The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. …”
Get full text
Get full text
Research Reports -
7
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
8
An analysis of hateful contents detection techniques on social media
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
9
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
10
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Content-based recommendation algorithm is implemented into the system as it can recommend the best skill content suitable for a job application. …”
Get full text
Get full text
Get full text
Book Section -
12
Classification model for chlorophyll content using CNN and aerial images
Published 2024“…The regression model will predict the chlorophyll content in number format, which requires experts to analyse the outcome. …”
Get full text
Get full text
Get full text
Article -
13
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
14
-
15
A method for Arabic handwritten diacritics characters
Published 2019Get full text
Get full text
Get full text
Article -
16
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
17
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
18
Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.]
Published 2023“…An experimental study showed that higher education teachers face the following learning issues: the development of a new content of mathematical disciplines aimed at creating the ability of future teachers to compose mathematical models, at ameliorating their mathematical thinking, interdisciplinary knowledge; development of a methodology for teaching future teachers of mathematics interdisciplinary knowledge, to compiling differential models.…”
Get full text
Get full text
Get full text
Article -
19
Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme
Published 2004“…It is a very appealing solution for development of optical packet switching. The issue of contention arises when two or more packets contend for the same output port in a switch with the same wavelength, which results to packet loss. …”
Get full text
Get full text
Thesis -
20
Satellite based quantitative rainfall estimation for flash flood forecasting / Wardah Tahir
Published 2008“…In this study, a rainfall estimation algorithm using the information from the geostationary meteorological satellite infrared (IR) images is developed for potential input to a flood forecasting system. …”
Get full text
Get full text
Thesis
