Search Results - (( java implication based algorithm ) OR ( based organization matching algorithm ))
Search alternatives:
- organization matching »
- based organization »
- implication based »
- java implication »
-
1
Web Based Supervisor Supervisee Project Matching System
Published 2010“…Finally, data analysis was done following the development of the system which was based on the matching algorithm suggested in this paper. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. The algorithm converts the model to coding, structures the process of entering data, automates the calculations and presents the results in a well-organized and suitable interfaces for the team managerial review purposes. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The organizer of sports events often fronting problems such as the incorrect allocation of matches as well as tough to create a good and reliable schedule. …”
Get full text
Get full text
Thesis -
6
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
7
Blockchain-based Management for Organ Donation and Transplantation
Published 2024“…Organ donation and transplantation systems now face a variety of requirements and obstacles in terms of registration, donor-recipient matching, organ removal, organ delivery, and transplantation, all of which are hampered by legal, clinical, ethical, and technical restrictions. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Document clustering based on inverse document frequency measure
Published 2005“…This paper describes several narrative clustering techniques such as Porter algorithm, Gusfield algorithm, similarity based on document hierarchy and Inverse Document Frequency (IDF), which intersect the documents in a cluster to determine the set of words (or phrases) shared by all the documents in the cluster. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A novel and high capacity audio steganography algorithm based on adaptive data embedding positions
Published 2023“…Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms. © Maxwell Scientific Organization, 2014.…”
Article -
10
Implementation of case-based reasoning in help desk system
Published 2019“…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
12
Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood
Published 2004“…First experiment use exact match, which is no method, is applied. Second experiment use stenmiing method. …”
Get full text
Get full text
Thesis -
13
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
Get full text
Get full text
Research Reports -
14
-
15
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
16
Scalable Self-Organizing Model for Grid Resource Discovery
Published 2008Get full text
Get full text
Conference or Workshop Item -
17
-
18
Fiducial registration error as a statistical process control metric in image-guidance radiotherapy with fiducial markers
Published 2011“…Portal imaging of implanted fiducial markers has been in use for image-guided radiotherapy (IGRT) of prostate cancer, with ample attention to localization accuracy and organ motion. The geometric uncertainties in point-based rigid-body matching algorithms during localization of prostate fiducial markers can be quantified in terms of a fiducial registration error (FRE). …”
Get full text
Article -
19
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…The imaging algorithm was based on a non-linear optimization technique from which the single-step and iterative inversion schemes were realized. …”
Get full text
Get full text
Thesis -
20
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph
