Search Results - (( semantics representation a algorithm ) OR ( java implementation developing algorithm ))
Search alternatives:
- implementation developing »
- semantics representation »
- java implementation »
- representation a »
- a algorithm »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The running system shows an OOP semantic knowledge representation by intelligent agents.…”
Get full text
Get full text
Get full text
Article -
2
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
3
DATA REPRESENTATION AND REASONING BASED ON SEMANTIC WEB INTEGRATION
Published 2015Get full text
Get full text
Thesis -
4
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item -
5
A deep autoencoder-based representation for Arabic text categorization
Published 2020“…Moreover, most existing methods ignore the explicit knowledge contained in semantic vocabularies such as Arabic WordNet. To overcome these shortcomings, we proposed a deep Autoencoder based representation for Arabic text categorization. …”
Get full text
Get full text
Get full text
Article -
6
Representing semantics of text by acquiring its canonical form
Published 2017“…The issue in text representation is to generate a formal approach of capturing meaning or semantics in sentences. …”
Get full text
Get full text
Article -
7
Visual-based semantic simultaneous localization and mapping for Robotic applications: a review
Published 2019“…Unlike the metric representation, semantic mapping is still immature, and it comes up short on durable formulation. …”
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
12
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
TB-FusionNet: a multi-scale feature fusion algorithm with spatial and channel cross-attention for tuberculosis detection
Published 2026“…The algorithm first calculates the similarity between local features at different levels to precisely select low-level detail features that are closely related to high-level semantic features, thereby generating a more hierarchical feature representation. …”
Get full text
Get full text
Get full text
Article -
14
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…Conclusion/Recommendations: Being able to infer XML functional dependencies constraints to relational views of XML data is a first step towards establishing a connection between XML and its relational representation at the semantic level.…”
Get full text
Get full text
Journal -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We employ conceptual graphs interchange format (CGIF) – a knowledge representation formalism to capture the structure and semantics of sentences. …”
Get full text
Get full text
Get full text
Article -
17
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
18
An object properties filter for multi-modality ontology semantic image retrieval
Published 2017“…Ontology is a semantic technology that provides the possible approach to bridge the issue on semantic gap in image retrieval between low-level visual features and high-level human semantic.The semantic gap occurs when there is a discrepancy between the information that is extracted from visual data and the text description.In other words, there is a difference between the computational representation in machine and human natural language.In this paper, an ontology has been utilized to reduce the semantic gap by developing a multi-modality ontology image retrieval with the enhancement of a retrieval mechanism by using the object properties filter. …”
Get full text
Get full text
Get full text
Article -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
20
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…The results generated from ESET has proven to be significant and supported a growing notion of semantic-based text anomaly which is increasingly evident in existing literatures. …”
Get full text
Get full text
Get full text
Thesis
