Search Results - (( process information needs algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin by Zainal Abidin, Abdul Hakim

    Published 2016
    “…This research purposed clustering algorithm to improve process extracting feature in images to get meaningful information because it can speed up the time to process of extracting meaningful information in images due to the efficient of the algorithm that has high performance to process the image. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Arabic word stemming algorithms and retrieval effectiveness by Sembok T.M.T., Ata B.A.

    Published 2023
    “…Documents retrieval in Information Retrieval Systems (IRS) is generally about retrieving of relevant documents pertaining to information needs. …”
    Conference Paper
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…Today, the advancement of information technology has led to a growing need for continuous processing of significant events, such as enhanced methods for monitoring road speed and mobile computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…In one-side incomplete information problem, comparison between MGT algorithm and smart random trade-offs (SRT) algorithm indicates that MGT outperforms SRT. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…Then the searching process will begin. There are two main processes involved in ABC Algorithm which are exploration and exploitation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…But the proposed algorithm still require high computation, the processing time will be long if the dataset is huge. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…Even though it makes use of the existing technology, this approach is often time consuming and involves manual intervention because of the mapping process. The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Moreover, the extraction algorithm is located in User_Agent to perform extraction of appropriate information needed from the text and later send this information to PAC_Agent for analysis modeling and displaying input, process and output. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed such as NIST Statistical Test, avalanche effect, cryptanalysis and efficiency to justify that it is a secure block cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20