Search Results - (( developing learning query algorithm ) OR ( java location based algorithm ))
Search alternatives:
- learning query »
- java »
-
1
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
Get full text
Get full text
Get full text
Thesis -
2
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Hence, this research aims to explore the use of Artificial Intelligence (AI) technique, particularly neural network (NN) in measuring the relevancy of each document compared to the users requests. Backpropagation learning algorithm has been used as a basis for learning in this study. …”
Get full text
Get full text
Get full text
Thesis -
3
Query disambiguation approach using triple-filter
Published 2017“…The proposed triple-filter disambiguation approach inculcates a learning mechanism that continues to automatically learn from user queries and continuously improves its performance capability. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…The learners usually ask the necessary skills that they expect to earn (query). The need is to develop a recommender system that can search for suitable learning paths. …”
Get full text
Get full text
Article -
6
-
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
9
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
Get full text
Get full text
Thesis -
10
-
11
Evaluation of arima and ann stream analytics for air quality monitoring system
Published 2021“…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. …”
Get full text
Get full text
Thesis -
12
Face recognition for remote database backup system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Customer mobile behavioral segmentation and analysis in telecom using machine learning
Published 2021“…This study aims to identify telecom customer segments by utilizing machine learning and subsequently develop a web-based dashboard. …”
Get full text
Get full text
Article -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Content-based indexing of low resolution documents
Published 2016“…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Car dealership web application
Published 2022“…The transfer learning algorithm pre-trained the River adaptive random forest regressor and classifier by transferring the tree structures and weights from the Scikit-learn fitted random forest regressor and classifier, respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…Secondly, the research progress of constructing automatic ontology development is to ensure DuriO is reliable. Automatic ontology development use ontology learning tool. …”
Get full text
Get full text
Thesis
