Search Results - (( information presentation based algorithm ) OR ( java implications based algorithm ))

Refine Results
  1. 1
  2. 2

    Book recommender mobile application / Amir Imran Kamaludin by Kamaludin, Amir Imran

    Published 2021
    “…The item based collaborative filtering are used in this system with Cosine based similarity algorithm as the main algorithm.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A review on the graphical user authentication algorithm : recognition-based and recall-based. by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2013
    “…In this paper, we explore two categories of the Graphical User Authentication Algorithm: Recognition-based and Recall-based. Examples from both categories are presented to compare the types of attacks encountered, usability and security.…”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of induced preorderings in score function-based method for solving decision-making with interval-valued fuzzy soft information by Ali, Mabruka, Kilicman, Adem, Khameneh, Azadeh Zahedi

    Published 2021
    “…In order to provide a partial solution to this problem, we present a group decision-making solution which is based on a preference relationship of interval-valued fuzzy soft information. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Propositional satisfiability algorithm to find minimal reducts for data mining by Bakar, A.A., Sulaiman, M.N., Othman, M., Selamat, M.H.

    Published 2002
    “…An algorithm in finding minimal reducts based on Prepositional Satisfiability (SAT) algorithm is proposed. …”
    Get full text
    Get full text
    Article
  9. 9

    Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA) by Hasni, Hassan, Aznida Hayati, Zakaria@Mohamad, Mohd Isa, Awang, Mokhairi, Makhtar, Rohana, Ismail, Fadhilah, Ahmad

    Published 2017
    “…This paper is based on a study that attempts to provide an alternative to ontology lookup for Semantic information retrieval. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Non-Distortion-Specific No-Reference Image Quality Assessment:A Survey by Abdul Manap, Redzuan, Shao, Ling

    Published 2015
    “…Over the last two decades,there has been a surge of interest in the research of image quality assessment due to its wide applicability to many domains.In general,the aim of image quality assessment algorithms is to evaluate the perceptual quality of an image using an objective index which should be highly consistent with the human subjective index.The objective image quality assessment algorithms can be classified into three main classes: full-reference,reduced-reference,and no-reference.While full-reference and reduced-reference algorithms require full information or partial information of the reference image respectively,no reference information is required for no-reference algorithms.Consequently,a no-reference (or blind) image quality assessment algorithm is highly preferred in cases where the availability of any reference information is implausible.In this paper,a survey of the recent no-reference image quality algorithms,specifically for non-distortion-specific cases,is provided in the first half of this paper.Two major approaches in designing the non-distortion-specific no-reference algorithms,namely natural scene statistics-based and learning-based,are studied.In the second half of this paper,their performance and limitations are discussed before current research trends addressing the limitations are presented.Finally,possible future research directions are proposed towards the end of this paper.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Document clustering based on firefly algorithm by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2015
    “…Document clustering is widely used in Information Retrieval however, existing clustering techniques suffer from local optima problem in determining the k number of clusters.Various efforts have been put to address such drawback and this includes the utilization of swarm-based algorithms such as particle swarm optimization and Ant Colony Optimization.This study explores the adaptation of another swarm algorithm which is the Firefly Algorithm (FA) in text clustering.We present two variants of FA; Weight- based Firefly Algorithm (WFA) and Weight-based Firefly Algorithm II (WFAII).The difference between the two algorithms is that the WFAII, includes a more restricted condition in determining members of a cluster.The proposed FA methods are later evaluated using the 20Newsgroups dataset.Experimental results on the quality of clustering between the two FA variants are presented and are later compared against the one produced by particle swarm optimization, K-means and the hybrid of FA and -K-means. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Consensus algorithms blockchain: a comparative study by hattab, Siham, Alyaseen, Imad Fakhri Taha

    Published 2019
    “…In this research, we also presented a new category of the Blockchain consensus algorithms, which consist of three groups as follows; the proof based on Hardware, the proof based on stake, and the proof based on voting.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
    Article
  19. 19

    Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model by Kaur, Arvinder, Kumar, Yugal

    Published 2021
    “…It was observed that the WWO algorithm suffered from the absence of global best information and premature convergence problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20