Search Results - (( java simulation optimisation algorithm ) OR ( construct information needs algorithm ))

Refine Results
  1. 1
  2. 2

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…Our enhanced algorithm features a good locality properties since it need only 2-hop neighborhood information within each node. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Construction and optimization of financial risk management model based on financial data and text data influencing information system by Hui Huang, Thien Sang Lim

    Published 2024
    “…Textual data insights can great lyimpact risk assessment results, although most risk management systems focus on quantitative financial assessments. This research constructs and enhances information system financial risk management models employing financial and textual data, including MD&A narratives, to fill this gap. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir

    Published 2016
    “…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
    Get full text
    Get full text
    Book Section
  6. 6

    A flexible query transformation framework for structured retrieval / Gan Keng Hoon by Gan, Keng Hoon

    Published 2013
    “…The framework is also able to represent various kinds of information needs and structured query languages with its proposed intermediate query representation. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    An ensemble data summarization approach based on feature transformation to learning relational data by Chung, Seng Kheau

    Published 2015
    “…The Information Gain borrowed from Information Retrieval theory and Term-term Correlation algorithm are used to determine the relevancy of these features to be selected or merged in order to form a new generation of TF-IDF vector space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…However, vital information can be hacked or interrupted during an active transmission over the Internet; therefore, the need for information security is paramount. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir by Md Nasir, Syerina Azlin

    Published 2016
    “…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Iterative methods for solving split common fixed point problems in Hilbert spaces by Mohammed, Lawan Bulama

    Published 2016
    “…In this regard, we consider an algorithm for solving such a problem which does not need any prior information on the norm of the bounded linear operator and establish the convergence results of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…The key results that were found during the project is that it is possible to find the semantic features with the system can produce results based on the text meaning such as the system. With this information the system is able to produce results that can gives the user some useful information which can contribute in the later construction of khutbah texts. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…Those processes constructed MCCTreeGenerator algorithm which will produce the same subtree as MCCTree but difference in its structure. …”
    Get full text
    Get full text
    Thesis
  17. 17

    TRMM Satellite Algorithm Estimates to Represent the Spatial Distribution of Rainstorms by Marina, Patrick, Mah, Yau Seng, Putuhena, Frederik Josep, Wang, Yin Chai, Onni Suhaiza, Selaman

    Published 2016
    “…On-site measurements from rain gauge provide important information for the design, construction, and operation of water resources engineering projects, groundwater potentials, and the water supply and irrigation systems. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…In RSS crawling process RSS feeds need to be gathered to extract useful information such as title, links, publish time and description. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The need for an extremely effective means of achieving information security is constantly necessary and indispensable. …”
    Get full text
    Get full text
    Thesis