Search Results - (( java application matching algorithm ) OR ( knowledge internalization using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Adaptive learning for lemmatization in morphology analysis by Ting, Mary, Abdul Kadir, Rabiah, Tengku Sembok, Tengku Mohd, Ahmad, Fatimah, Azman, Azreen

    Published 2014
    “…Morphological analysis is used to study the internal structure words by reducing the number of vocabularies used while retaining the semantic meaning of the knowledge in NLP system. …”
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System by AL-Khaleefa, Ahmed Salih, Mohd Riduan, Ahmad, Awang Md Isa, Azmi, AL-Saffar, Ahmed, Mohd Esa, Mona Riza, Malik, Reza Firsandaya

    Published 2019
    “…WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20