Search Results - (( java implication based algorithm ) OR ( based organization matching algorithm ))

Refine Results
  1. 1

    Web Based Supervisor Supervisee Project Matching System by Messaoud, Benotmane

    Published 2010
    “…Finally, data analysis was done following the development of the system which was based on the matching algorithm suggested in this paper. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. The algorithm converts the model to coding, structures the process of entering data, automates the calculations and presents the results in a well-organized and suitable interfaces for the team managerial review purposes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The organizer of sports events often fronting problems such as the incorrect allocation of matches as well as tough to create a good and reliable schedule. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun by Wan Harun, Wan Muhammad Aqil

    Published 2016
    “…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Blockchain-based Management for Organ Donation and Transplantation by Harish, V., Ushasree, ., Chitra, B.

    Published 2024
    “…Organ donation and transplantation systems now face a variety of requirements and obstacles in terms of registration, donor-recipient matching, organ removal, organ delivery, and transplantation, all of which are hampered by legal, clinical, ethical, and technical restrictions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Document clustering based on inverse document frequency measure by Wan Faridah Hanum, Wan Yaacob

    Published 2005
    “…This paper describes several narrative clustering techniques such as Porter algorithm, Gusfield algorithm, similarity based on document hierarchy and Inverse Document Frequency (IDF), which intersect the documents in a cluster to determine the set of words (or phrases) shared by all the documents in the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A novel and high capacity audio steganography algorithm based on adaptive data embedding positions by Shahadi H.I., Jidin R., Way W.H.

    Published 2023
    “…Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms. © Maxwell Scientific Organization, 2014.…”
    Article
  10. 10

    Implementation of case-based reasoning in help desk system by Tee, Shih Min

    Published 2019
    “…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood by Mahmood, Aminah

    Published 2004
    “…First experiment use exact match, which is no method, is applied. Second experiment use stenmiing method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.] by Buja, Al Ya@Geogiana, Ahmad, Illiasaak, Zolkeply, Mohd Syafiq

    Published 2014
    “…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
    Get full text
    Get full text
    Research Reports
  14. 14
  15. 15

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Fiducial registration error as a statistical process control metric in image-guidance radiotherapy with fiducial markers by Ung, N.M., Wee, L.

    Published 2011
    “…Portal imaging of implanted fiducial markers has been in use for image-guided radiotherapy (IGRT) of prostate cancer, with ample attention to localization accuracy and organ motion. The geometric uncertainties in point-based rigid-body matching algorithms during localization of prostate fiducial markers can be quantified in terms of a fiducial registration error (FRE). …”
    Get full text
    Article
  19. 19

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…The imaging algorithm was based on a non-linear optimization technique from which the single-step and iterative inversion schemes were realized. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
    Get full text
    Get full text
    Monograph