Search Results - (( developing learning query algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik by Fadhilah, Mat Yamin

    Published 2002
    “…Hence, this research aims to explore the use of Artificial Intelligence (AI) technique, particularly neural network (NN) in measuring the relevancy of each document compared to the users requests. Backpropagation learning algorithm has been used as a basis for learning in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Query disambiguation approach using triple-filter by Agaie, Aliyu Isah

    Published 2017
    “…The proposed triple-filter disambiguation approach inculcates a learning mechanism that continues to automatically learn from user queries and continuously improves its performance capability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Meta-Heuristic Algorithms for Learning Path Recommender at MOOC by Son, N.T., Jaafar, J., Aziz, I.A., Anh, B.N.

    Published 2021
    “…The learners usually ask the necessary skills that they expect to earn (query). The need is to develop a recommender system that can search for suitable learning paths. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  9. 9

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Evaluation of arima and ann stream analytics for air quality monitoring system by Nurmadiha, Osman

    Published 2021
    “…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Customer mobile behavioral segmentation and analysis in telecom using machine learning by Sharaf Addin, Eman Hussein, Admodisastro, Novia Indriaty, Mohd Ashri, Siti Nur Syahirah, Kamaruddin, Azrina, Chew, Yew Chong

    Published 2021
    “…This study aims to identify telecom customer segments by utilizing machine learning and subsequently develop a web-based dashboard. …”
    Get full text
    Get full text
    Article
  14. 14

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…The transfer learning algorithm pre-trained the River adaptive random forest regressor and classifier by transferring the tree structures and weights from the Scikit-learn fitted random forest regressor and classifier, respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…Secondly, the research progress of constructing automatic ontology development is to ensure DuriO is reliable. Automatic ontology development use ontology learning tool. …”
    Get full text
    Get full text
    Thesis