Search Results - (( java application testing algorithm ) OR ( problem representation matching algorithm ))

Refine Results
  1. 1

    Image matching using relational graph representation by Lai, Chui Yen

    Published 2005
    “…Feature-based matching algorithm cannot tackle the problem of matching ambiguities easily. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Implementation of case-based reasoning in help desk system by Tee, Shih Min

    Published 2019
    “…In my system, it consists of the following steps which are case representation and storage, case matching and retrieval. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Traditional schema theory does not support Lamatckian learning, i.e, forcing the genetic representation to match the solution found by the learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…For next, instead of k-means clustring, Fuzzy cmeans clustering is combined with Spatial Pyramid Matching image representation to improve the accuracy of classification results. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    A systematic review of face sketch recognition system / Nur Nabilah Bahrum, Samsul Setumin, Mohd Firdaus Abdullah, Mohd Ikmal Fitri Maruzuki and Adi Izhar Che Ani by Bahrum, Nur Nabilah, Setumin, Samsul, Abdullah, Mohd Firdaus, Maruzuki, Mohd Ikmal Fitri, Che Ani, Adi Izhar

    Published 2023
    “…Even though the sketches contain all of the necessary information about the suspect face's spatial topology and geometric details, it is still difficult for manual face recognition to identify and match sketch representations to the corresponding photo. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Using the line array representation as an alternative method for understanding whole number multiplication among primary students by Chai, Chin Pheng

    Published 2015
    “…Problems that students had faced with using the array and dilemmas that researcher encountered throughout the study are discussed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Machine learning (ML) based methods are the popular solution for this problem. However, the developed models typically provide low expressivity and lacking in human-understandable representation. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project