Search Results - (( semantics representation a algorithm ) OR ( java implementation developing algorithm ))

Refine Results
  1. 1

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The running system shows an OOP semantic knowledge representation by intelligent agents.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA) by Hasni, Hassan, Aznida Hayati, Zakaria@Mohamad, Mohd Isa, Awang, Mokhairi, Makhtar, Rohana, Ismail, Fadhilah, Ahmad

    Published 2017
    “…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A deep autoencoder-based representation for Arabic text categorization by El-Alami, Fatima-Zahra, El Mahdaouy, Abdelkader, El Alaoui, Said Ouatik, En-Nahnahi, Noureddine

    Published 2020
    “…Moreover, most existing methods ignore the explicit knowledge contained in semantic vocabularies such as Arabic WordNet. To overcome these shortcomings, we proposed a deep Autoencoder based representation for Arabic text categorization. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Representing semantics of text by acquiring its canonical form by Taiye, Mohammed Ahmed, Kamaruddin, Siti Sakira, Ahmad, Farzana Kabir

    Published 2017
    “…The issue in text representation is to generate a formal approach of capturing meaning or semantics in sentences. …”
    Get full text
    Get full text
    Article
  7. 7

    Visual-based semantic simultaneous localization and mapping for Robotic applications: a review by Atoui, Oussama, Husni, Husniza, Che Mat, Ruzinoor

    Published 2019
    “…Unlike the metric representation, semantic mapping is still immature, and it comes up short on durable formulation. …”
    Get full text
    Get full text
    Article
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    TB-FusionNet: a multi-scale feature fusion algorithm with spatial and channel cross-attention for tuberculosis detection by Ding, Zeyu, Yaakob, Razali, Tieng Wei, Koh, Azman, Azreen, Mohd Rum, Siti Nurulain, Zakaria, Nor Fadhlina, Ahmad Nazri, Azree Shahril

    Published 2026
    “…The algorithm first calculates the similarity between local features at different levels to precisely select low-level detail features that are closely related to high-level semantic features, thereby generating a more hierarchical feature representation. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Conclusion/Recommendations: Being able to infer XML functional dependencies constraints to relational views of XML data is a first step towards establishing a connection between XML and its relational representation at the semantic level.…”
    Get full text
    Get full text
    Journal
  15. 15

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We employ conceptual graphs interchange format (CGIF) – a knowledge representation formalism to capture the structure and semantics of sentences. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An object properties filter for multi-modality ontology semantic image retrieval by Sulaiman, Mohd Suffian, Nordin, Sharifalillah, Jamil, Nursuriati

    Published 2017
    “…Ontology is a semantic technology that provides the possible approach to bridge the issue on semantic gap in image retrieval between low-level visual features and high-level human semantic.The semantic gap occurs when there is a discrepancy between the information that is extracted from visual data and the text description.In other words, there is a difference between the computational representation in machine and human natural language.In this paper, an ontology has been utilized to reduce the semantic gap by developing a multi-modality ontology image retrieval with the enhancement of a retrieval mechanism by using the object properties filter. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…The results generated from ESET has proven to be significant and supported a growing notion of semantic-based text anomaly which is increasingly evident in existing literatures. …”
    Get full text
    Get full text
    Get full text
    Thesis