Search Results - (( solution information context algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…After economic comprehension of the problem at hand; available systems in the literature which operate in a comparable context are reviewed. The major finding of this review is that context-specific text mining algorithms are lacking. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Semantic relatedness maximisation for word sense disambiguation using a hybrid firefly algorithm by Hamad, A.H., Mahmood, A.A., Abed, S.A., Ying, X.

    Published 2021
    “…Mainly, a WSD solution improves the accuracy of text summarisation, information retrieval, and machine translation. …”
    Get full text
    Get full text
    Article
  7. 7

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
    Get full text
    Get full text
    Article
  8. 8

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…E-tour guides are digital tools like apps or websites that inform tourists about their destination. In this context, recommendation systems and information dissemination are closely related. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An improved artificial dendrite cell algorithm for abnormal signal detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…In this context, data mining has arisen as an important research area that helps to reveal the hidden useful information from the raw data collected. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…While the firefly algorithm solution is superior, it has a higher time complexity compared to other algorithms used when there are more hidden layers and neurons. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    3D graphics visualization for interactive mobile users navigation by Mantoro, Teddy, Abubakar, Adamu, Ayu, Media Anugerah

    Published 2012
    “…The solutions will be provided through implementing an efficient, scalable dynamic entity navigation solution by means of Bi-A* path finding algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cost-based hybrid flow shop scheduling with uniform machine optimization using an improved tiki-taka algorithm by Mohd Fadzil Faisae, Ab Rashid, Muhammad Ammar, Nik Mu’tasim

    Published 2024
    “…The results indicated that the TTA consistently outperforms other algorithms. It delivers the best mean fitness and better solution distribution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An efficient multi join query optimization for relational database management system using swarm intelligence approaches by Alsaedi, Ahmed Khalaf Zager

    Published 2016
    “…The majority of MJQO techniques encompass solution space at an extremely reduced pace. Many queries attempted to gather information from multiple sites or correlations, while every relation are compelled to answer these query via their limited resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient multi join query optimization for relational database management system using swarm intelligence approaches by Alsaedi, Ahmed Khalaf Zager

    Published 2016
    “…The majority of MJQO techniques encompass solution space at an extremely reduced pace. Many queries attempted to gather information from multiple sites or correlations, while every relation are compelled to answer these query via their limited resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Automate customer support handling E-Commerce enquiry using ChatGPT by Teo, Wen Jin

    Published 2024
    “…Reinforcement learning techniques will adapt the summarization model based on human agent feedback, and Bachelor of Information Systems (Honours) Information Systems Engineering Faculty of Information and Communication Technology (Kampar Campus), UTAR 7 feedback analysis identifies areas for continuous improvement. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis