Search Results - (( java application stemming algorithm ) OR ( structural relations using algorithm ))

Refine Results
  1. 1

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…The fourth and fifth algorithms, Concept Feature Vector_Text Classification (CFV_TC) and Structure Feature Vector_Text Classification (SFV_TC) classify the document to its related set of classes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Image matching using relational graph representation by Lai, Chui Yen

    Published 2005
    “…The method involves the representation of the structural descriptions of image in relational graph and the matching between relational graphs to perform image matching. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…Currently, the automatic computer tools are not applicable to estimate the immunity against related-key differential attacks for SPN block ciphers structure. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sampling weight adjustments in partial least squares structural equation modeling: guidelines and illustrations by Cheah, Jun Hwa, Roldan, Jose L., Ciavolino, Enrico, Ting, Hiram, Ramayah, T.

    Published 2020
    “…It also illustrates that the use of the WPLS algorithm produces different inference test results in the structural model and different predictive relevance results. …”
    Get full text
    Get full text
    Article
  6. 6

    Exploring fruit fly evolutionary algorithm in a university examination timetabling environment by Abdul Rahman, Syariza, Benjamin, Aida Mauziah, Ramli, Razamin, Ku-Mahamud, Ku Ruhana, Omar, Mohd Faizal

    Published 2019
    “…A new evolutionary algorithm namely the Fruit-Fly Optimization Algorithm (FOA) which is based on the behavior of finding food by the fruit fly is used as solution methodology. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    XRecursive, An Efficient Relational Method to Store XML Data by Jasni, Mohamad Zain, K.F., Rabbi, M.A., Ibrahim Fakharaldien, Norrozila, Sulaiman

    Published 2011
    “…The steps and algorithm are given in details to describe how to use the storing structure to storage and query XML documents in relational database. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Approach: In this study we present an algorithm for generating an optimal design for XML in relational setting. …”
    Get full text
    Get full text
    Journal
  10. 10

    Linear quadratic regulator with genetic algorithm for flexible structures vibration control by Jafari, Mohammad

    Published 2015
    “…There has been tremendous growth in the study of active vibration suppression of flexible structures in aerospace and robotics applications. The mathematical modeling of flexible structure is usually complex; for the control of flexible structure one needs to design an algorithm which is related to mathematical model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
    Get full text
    Get full text
    Article
  12. 12

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Multi-layer perceptron (MLP) neural network trained using backpropagation algorithm is used to segment the color image. …”
    Get full text
    Get full text
    Thesis
  13. 13

    XRecursive: An efficient method to store and query XML documents by Mohammed Adam Ibrahim, Fakharaldien, Jasni, Mohamad Zain, Norrozila, Sulaiman

    Published 2011
    “…The steps and algorithm are given in details to describe how to use the storing structure to storage and query XML documents in relational database. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…Results: The analysis revealed that all three intrinsic needs—competence, autonomy, and relatedness—along with social media algorithms and source credibility, positively correlated with fitness-related health information use behaviors among youth. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…Owing to the fact that they are new and much of their relative performance are still unknown (as compared to other established meta-heuristic algorithms), Bacterial Foraging Optimization Algorithm (BFO) and Bat Algorithm (BA) have been adopted for comparison using the 12 selected benchmark functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Constraint preserving mapping algorithm for XML storage by Ahmad, Kamsuriah, Mamat, Ali, Ibrahim, Hamidah, Mohd Noah, Shahrul Azman

    Published 2006
    “…In this paper, we propose an algorithm how to preserve these constraints while mapping from XML to relational schema. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    A framework for design of automated lecture timetabling using memetic algorithm / Zarina Zainul Rashid, Roslan Sadjirin and Norhafizah Hashim by Rashid, Zarina Zainul, Sadjirin, Roslan, Hashim, Norhafizah

    Published 2009
    “…The writers analyse the process, problem and the constraints in timetabling development and study the disciplines that relate to memetic algorithm approach. These requirement specifications are used to design the data structure and the algorithms to produce system architecture for a framework of the automated timetabling system.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis