Search Results - (( developing social normalization algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- normalization algorithm »
- social normalization »
- developing social »
- java implication »
- implication tree »
- tree algorithm »
-
1
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…The proposed algorithm manually developed dictionary that employ normalization of each non-standard word with its equivalent standard word. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research
Published 2013“…Currently numerous theories and model have been developed to associate various findings or in relating EEG patterns to develop a software simulator. …”
Get full text
Get full text
Get full text
Non-Citation Index Journal -
4
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021“…Visual impairment may cause people difficulties with normal daily activities such as driving, reading, socializing and walking. …”
Get full text
Get full text
Conference or Workshop Item -
5
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design and development of elective courses recommender system (ECORS)
Published 2017Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Assistive technology : Sign language translation application for hearing-impaired communication / Muhammad Amin Naim Ab Karim
Published 2020“…Therefore, the proposed application proved can be beneficial to the normal and hearing-impaired people by improving the social interaction and also can motivate other developers to help contribute for more future projects to help the hearing-impaired people.…”
Get full text
Get full text
Thesis -
8
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
Get full text
Get full text
Thesis -
9
-
10
Crowd behavior monitoring using self-adaptive social force model
Published 2019“…This work aims to develop a crowd behavior monitoring system using Self-Adaptive SFM. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Risk management credit scoring prediction using sentiment analysis
Published 2024“…The project adopts a development-based approach with field of data science, leveraging NLP techniques and classification algorithms to seamlessly integrate sentiment-derived features with conventional credit scoring attributes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Development of a lower-extremities exoskeleton for postural-sway in sit-to-stand movement
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
-
15
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A coherent knowledge-driven deep learning model for idiomatic - aware sentiment analysis of unstructured text using Bert transformer
Published 2023“…Therefore, we automated the development of such resources at scale to alleviate the lag time and the cost normally associated with their procurement. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…It is because recently the spammers and attacker had improved their strategy so that the malicious email and the DDoS packets are hardly able to be differentiated with the normal email and data packets. Once the Social Engineering is used by the spammers to create relevant email content in the malicious spam email and when a new campaign of DDoS attack is launched by the attacker, no normal users are capable to distinguish the benign and malicious email or data packets. …”
Get full text
Get full text
Thesis
