Search Results - (( semantics representation using algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- semantics representation »
- representation using »
- implementation based »
- java implementation »
- using algorithm »
-
1
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
2
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…However, Semantic Web calls for the use of ontologies for many domains. …”
Get full text
Get full text
Conference or Workshop Item -
3
A deep autoencoder-based representation for Arabic text categorization
Published 2020“…It consisted of three stages: (1) Extracting from Arabic WordNet the most relevant concepts based on feature selection processes (2) Features learning via an unsupervised algorithm for text representation (3) Categorizing text using deep Autoencoder. …”
Get full text
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Representing semantics of text by acquiring its canonical form
Published 2017“…The issue in text representation is to generate a formal approach of capturing meaning or semantics in sentences. …”
Get full text
Get full text
Article -
6
Visual-based semantic simultaneous localization and mapping for Robotic applications: a review
Published 2019“…Unlike the metric representation, semantic mapping is still immature, and it comes up short on durable formulation. …”
Get full text
Get full text
Article -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
-
9
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
12
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
13
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…Results: We show that our algorithm is efficient in terms of reducing data redundancy and preserving semantic expression. …”
Get full text
Get full text
Journal -
14
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
Get full text
Get full text
Get full text
Thesis -
15
An object properties filter for multi-modality ontology semantic image retrieval
Published 2017“…Ontology is a semantic technology that provides the possible approach to bridge the issue on semantic gap in image retrieval between low-level visual features and high-level human semantic.The semantic gap occurs when there is a discrepancy between the information that is extracted from visual data and the text description.In other words, there is a difference between the computational representation in machine and human natural language.In this paper, an ontology has been utilized to reduce the semantic gap by developing a multi-modality ontology image retrieval with the enhancement of a retrieval mechanism by using the object properties filter. …”
Get full text
Get full text
Get full text
Article -
16
Semantic triple ranking based on levenshtien reverse engineering approach
Published 2015“…In this study, semantic triple ranking mechanism is proposed. The approach is based on using levenshtien string matching algorithm a reverse engineering approach. …”
Get full text
Get full text
Get full text
Article -
17
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Hence, maintainers can make use of both the explicit and implicit constraints to help in creating a high-level semantic representation of the software design that is coherent and consistent with the actual code structure. …”
Get full text
Get full text
Thesis -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
19
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
20
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers
