Search Results - (( java implementation level algorithm ) OR ( using semantic learning algorithm ))

Refine Results
  1. 1

    Multilingual Ontology Learning Algorithm for Emails by Beseiso M., Ahmad A.R., Ismail R., Taher M.

    Published 2023
    “…In this research, we have explained the necessity for utilizing multilingual ontology learning processes to solve this problem. We have proposed the multilingual ontology learning algorithm for semantic email. …”
    Conference paper
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…We propose a new reinforced active learning strategy based on a deep reinforcement learning algorithm. …”
    Get full text
    Get full text
    Article
  4. 4

    Visual and semantic context modeling for scene-centric image annotation by Zand, Mohsen, Doraisamy, Shyamala, Abdul Halin, Alfian, Mustaffa, Mas Rina

    Published 2015
    “…The sub-visual distributions are discovered through a clustering algorithm, and probabilistically associated with semantic classes using mixture models. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Inference Algorithms in Latent Dirichlet Allocation for Semantic Classification by Mohammad Zubir, W.M.A., Abdul Aziz, I., Jaafar, J., Hasan, M.H.

    Published 2018
    “…The inference algorithm used in this research work is Gibbs sampling. …”
    Get full text
    Get full text
    Article
  7. 7

    Inference Algorithms in Latent Dirichlet Allocation for Semantic Classification by Mohammad Zubir, W.M.A., Abdul Aziz, I., Jaafar, J., Hasan, M.H.

    Published 2018
    “…The inference algorithm used in this research work is Gibbs sampling. …”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive learning for lemmatization in morphology analysis by Ting, Mary, Abdul Kadir, Rabiah, Tengku Sembok, Tengku Mohd, Ahmad, Fatimah, Azman, Azreen

    Published 2014
    “…Morphological analysis is used to study the internal structure words by reducing the number of vocabularies used while retaining the semantic meaning of the knowledge in NLP system. …”
    Get full text
    Conference or Workshop Item
  9. 9

    A Study of Automated Essay Scoring Frameworks on Evaluating Malaysian University English Test Essays Based on Syntactic and Semantic Features by Chun Then, Lim

    Published 2023
    “…Based on the results, we found that syntactic features of an essay have a higher effect than semantic features towards essay grades. Besides, we also found that the differences between machine learning and deep learning algorithms were not obvious, and neither algorithm's performance can be considered excellent because the quadratically weighted Kappa (QWK) scores were less than 0.75. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Based on the undertaken experiment the LSI classifier is noted to generate a higher precision and recall compared to the C4.5 algorithm. Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  15. 15

    Place recognition using semantic concepts of visual words by Rostami, Vahid, Ramli, Abdul Rahman, Samsudin, Khairulmizam, Saripan, M. Iqbal

    Published 2011
    “…This paper presents a supervised learning framework for place recognition using the semantic concepts of visual words. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Learning a deeply supervised multi-modal RGB-D embedding for semantic scene and object category recognition by Mohd Zaki, Hasan Firdaus, Shafait, Faisal, Mian, Ajmal

    Published 2017
    “…Recognizing semantic category of objects and scenes captured using vision-based sensors is a challenging yet essential capability for mobile robots and UAVs to perform high-level tasks such as long-term autonomous navigation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An automated learner for extracting new ontology relations by Amaal Saleh Hassan, Al Hashimy, Narayanan, Kulathuramaiyer

    Published 2013
    “…As this task 'automatic recognition of semantic relations between pairs of words in text' can be used in many NLP applications, its implementation are demanding and may include many potential methodologies. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Semantic focus fusion based on deep learning for deblurring effect by Ismail, .

    Published 2024
    “…The method is termed semantic focus fusion for deblurring effect. It employs deep learning architecture to extract focus and blurred features. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Ontology enrichment with causation relations by Amaal Saleh Hassan, Al Hashimy, Narayanan, Kulathuramaiyer

    Published 2014
    “…This study is then an attempt to create an enhanced framework for discovering and classifying ontological relationships by using a machine learning strategy. We take into consideration the context of the input text in performing the classification of the semantic relations, in particular, causation relations. …”
    Get full text
    Get full text
    Get full text
    Article