Search Results - (( developing formative content algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1
  2. 2

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The letter document has their own format, which consists of many parts. The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman by Abd Rahman, Hayati

    Published 2006
    “…The letter document has their own format, which consists of many parts. The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Text normalization algorithm for facebook chats in Hausa language by Jaafar, Zubairu Maitama, Haruna, Usman, Gambo, Abdullahi Ya'u, Thomas, Bimba Andrew, Idris, Norisma, Ya’u Gital, Abdulsalam, Abubakar, Adamu

    Published 2014
    “…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.] by Mohd Khairuddin, Nurul Syahmina, Ahmadon, Fadzlin, Hashim, Madihah Hannani, Mohd Vauxhall, Nur Ain Emylia

    Published 2022
    “…Content-based recommendation algorithm is implemented into the system as it can recommend the best skill content suitable for a job application. …”
    Get full text
    Get full text
    Get full text
    Book Section
  11. 11
  12. 12

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.] by Nurgabyl, Duisebek, Zhailaubaeva, Nazgul, Abdoldinova, Gulsim, Kaidassov, Zhetkerbai

    Published 2023
    “…An experimental study showed that higher education teachers face the following learning issues: the development of a new content of mathematical disciplines aimed at creating the ability of future teachers to compose mathematical models, at ameliorating their mathematical thinking, interdisciplinary knowledge; development of a methodology for teaching future teachers of mathematics interdisciplinary knowledge, to compiling differential models.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme by Go, Yun Ii

    Published 2004
    “…It is a very appealing solution for development of optical packet switching. The issue of contention arises when two or more packets contend for the same output port in a switch with the same wavelength, which results to packet loss. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Satellite based quantitative rainfall estimation for flash flood forecasting / Wardah Tahir by Tahir, Wardah

    Published 2008
    “…In this study, a rainfall estimation algorithm using the information from the geostationary meteorological satellite infrared (IR) images is developed for potential input to a flood forecasting system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of Malaysia breast cancer survival prognostic tool (myBeST) for prediction of survival probability among women with breast cancer in Malaysia by Kadir, Mohd Nasrullah Nik Ab.

    Published 2023
    “…Subsequently, in Phase 2, the model was deployed in a web-based format with accompanying content to describe the tool. …”
    Get full text
    Get full text
    Thesis