Search Results - (( development using content algorithm ) OR ( java application reoptimize algorithm ))

Refine Results
  1. 1

    Boyer-Moore horspool algorithm used in content management system of data fast searching by Chan, Chung Hoong, M. A., Ameedeen

    Published 2017
    “…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani by Mohd Zamani, Walid Burhani

    Published 2025
    “…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  5. 5

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…Expediting these conclusions, firstly, perceptual color palettes to be used as the perceptual threshold were defined. Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Automated content sizing using accelerometer by Ng, Yun Hao

    Published 2014
    “…In design and implementation, the value of Z-axis is tracked and used in the zooming algorithm. The algorithm is designed to zoom in the photo when the value of Z-axis increase and vice versa. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman by Abd Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  10. 10
  11. 11

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…By using this algorithm, the web page is segmented into several big blocks. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Application of artificial neural network to simulate phenolic content and antioxidant activity during spontaneous fermentation of Carica papaya leaf / Nur Syahira Mohammad and Moha... by Mohammad, Nur Syahira, So’aib, Mohamad Sufian

    Published 2020
    “…The input of the ANN model is volume and day of fermentation, while the output is the phenolic content and antioxidant activity. Trial and error method were used to develop the ANN model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…The personalization is using an agent-based approach. System architecture was designed and implement in video adaptation algorithms development. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
    Get full text
    Thesis
  18. 18
  19. 19

    A wavelet based watermarking algorithm for video by Hussin, Saleh, Babakr, Elsadig, Ramli, Abd Rahman, Al-Hadad, Sayed R.

    Published 2005
    “…Nowadays, digital contents can be copied easily because of the development of digital technology. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis