Search Results - (( based content method algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- method algorithm »
- using algorithm »
- based content »
-
1
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Therefore, a progressive web-based information retrieval visualization system that utilizes Term Frequency-Inverse Document Frequency (TFIDF) algorithm and data visualization are suggested to solve these problems. …”
Get full text
Get full text
Thesis -
2
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
3
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
Get full text
Get full text
Get full text
Article -
4
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
5
Determining number of clusters using firefly algorithm with cluster merging for text clustering
Published 2015“…Such a scenario requires a dynamic text clustering method that operates without initial knowledge on a data collection.In this paper, a dynamic text clustering that utilizes Firefly algorithm is introduced.The proposed, aFAmerge, clustering algorithm automatically groups text documents into the appropriate number of clusters based on the behavior of firefly and cluster merging process. …”
Get full text
Get full text
Book Section -
6
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Moreover, for the proposed SBD algorithm, a comparative study is performed with state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Content-based indexing of low resolution documents
Published 2016“…The proposed identification and indexing method in the thesis uses a Visual Signature (VS). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review
Published 2022“…Background: Forensic odontology may require a visual or clinical method during identification. Sometimes it may require forensic experts to refer to the existing technique to identify individuals, for example, by using the atlas to estimate the dental age. …”
Get full text
Get full text
Get full text
Article -
10
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This research contributes to the methods of capturing tacit knowledge using a cognitive-based approach, which important to ensure the continuity of business in various domains.…”
Get full text
Get full text
Thesis -
11
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…The goal is to empower suicide prevention organizations and concerned individuals with an efficient and accessible means of taking timely actions toward individuals at risk. The result of the data analysis is visualized into a web application system to enable the analysis results to be interpretable and readable by the user using Plotly visualization tool. …”
Get full text
Get full text
Thesis -
12
EEG-Based Biometric Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2018“…A predefined window size can be used to reduce the overall processing time. This proposed algorithm was verified with test data from 37 healthy subjects. …”
Get full text
Get full text
Get full text
Article -
13
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithms are a captivating use case for visualization. …”
Get full text
Get full text
Get full text
Article -
15
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
Get full text
Get full text
Thesis -
16
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
17
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
18
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The aim of the proposed approach is to study the benefit of using visualization techniques to explorer Genetic Algorithm data based on gene values. …”
Get full text
Get full text
Thesis -
19
-
20
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis
