Search Results - (( semantics representation _ algorithm ) OR ( java implementation developing algorithm ))
Search alternatives:
- implementation developing »
- semantics representation »
- java implementation »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The running system shows an OOP semantic knowledge representation by intelligent agents.…”
Get full text
Get full text
Get full text
Article -
2
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
3
DATA REPRESENTATION AND REASONING BASED ON SEMANTIC WEB INTEGRATION
Published 2015Get full text
Get full text
Thesis -
4
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item -
5
A deep autoencoder-based representation for Arabic text categorization
Published 2020“…Until recently, the Bag-of-Words remains the most common method for Arabic text representation. However, it suffers from several shortcomings such as semantics deficiency and high dimensionality of feature space. …”
Get full text
Get full text
Get full text
Article -
6
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
Representing semantics of text by acquiring its canonical form
Published 2017“…The issue in text representation is to generate a formal approach of capturing meaning or semantics in sentences. …”
Get full text
Get full text
Article -
9
Visual-based semantic simultaneous localization and mapping for Robotic applications: a review
Published 2019“…Unlike the metric representation, semantic mapping is still immature, and it comes up short on durable formulation. …”
Get full text
Get full text
Article -
10
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
-
13
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
17
TB-FusionNet: a multi-scale feature fusion algorithm with spatial and channel cross-attention for tuberculosis detection
Published 2026“…The algorithm first calculates the similarity between local features at different levels to precisely select low-level detail features that are closely related to high-level semantic features, thereby generating a more hierarchical feature representation. …”
Get full text
Get full text
Get full text
Article -
18
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…Results: We show that our algorithm is efficient in terms of reducing data redundancy and preserving semantic expression. …”
Get full text
Get full text
Journal -
19
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
20
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We resolve two non-trivial problems, i.e. semantic representation of text and the complexity of graph matching. …”
Get full text
Get full text
Get full text
Article
