Search Results - (( java implementation phase algorithm ) OR ( filing rules using algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- using algorithm »
- filing rules »
- rules using »
-
1
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…Other than that, affixes rule format in file "rule.txt" are added and misspell words are corrected. …”
Get full text
Get full text
Thesis -
2
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…In second experiment, affixes rule are added in rule format in file "rule.txt". …”
Get full text
Get full text
Thesis -
3
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
Get full text
Get full text
Get full text
Book Section -
4
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
6
Enhancement of rules-application-order (RAO) stemming algorithm based on the first character of Malay word / Edatul Muliana Ghazalli
Published 2005“…Stemming is important thing to improve retrieval effectiveness. Stemming is used to reduce the size of indexing file for relevancy of document retrieval. …”
Get full text
Get full text
Thesis -
7
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
8
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
FURIA stacking ensemble for ASD classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
10
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…Other than that we modify the total value for 'a', 'k' and 'm'dictionary in header file "dcvarnew.h". Third, the modification into the program is adding the affixes rule format in "rule.txt" Forth, add a new code to differentiate the use of affix rule of "di+an" and "di+kan". …”
Get full text
Get full text
Thesis -
11
-
12
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
13
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…Mining user patterns of log file can provide significant and useful informative knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Predicting next page access by Markov models and association rules on web log data
Published 2006“…Mining user patterns of log file can provide significant and useful informative knowledge. …”
Get full text
Get full text
Get full text
Article -
17
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
18
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis -
19
Pixel-based skin color detection technique
Published 2005Get full text
Get full text
Get full text
Article -
20
