Search Results - (( java implication based algorithm ) OR ( based evaluation styles algorithm ))
Search alternatives:
- implication based »
- evaluation styles »
- java implication »
- based evaluation »
- styles algorithm »
-
1
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
Get full text
Get full text
Get full text
Thesis -
2
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
3
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
4
-
5
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
Published 2015“…This technique is used to consider their learning styles and how to improve students’ performance in learning DBM1013 – Engineering, Mathematics, the questionnaires were evaluated to identify the best learning styles used by students in learning Engineering Mathematics. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
9
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In order to measure performance of the proposed algorithm, evaluation was done by several independent UCI datasets and the results were compared with RF and some individual classifiers. …”
Get full text
Get full text
Get full text
Thesis -
10
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The reason for selecting the DHQ for evaluation purposes is its availability in different styles like uthmani and plain Arabic style that makes evaluation possible based on our first method. …”
Get full text
Get full text
Get full text
Thesis -
11
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…For evaluation, we measured the algorithm's functionality in identifying the different strategies. …”
Get full text
Get full text
Get full text
Article -
12
Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli
Published 2018“…Based on the prosody analysis, a grammar-based prosody modification rules are proposed by integrating grammatical structure. …”
Get full text
Get full text
Thesis -
13
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…The performance of the stylometry-based blind steganalysis model is then evaluated based on all false rate, missing rate and accuracy rate and compared against three other standard classifiers in steganalysis; Naive Bayes (NB), k-Nearest Neighbor (k-NN), and Decision Tree (J48). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
Published 2018“…Generally, different terminologies and different styles have been adopted for writing pseudo code for different algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…On this paper, we empirically evaluate facial representation based totally on statistical local functions, neighborhood Binary styles, for person-independent facial expression recognition. …”
Get full text
Get full text
Final Year Project -
18
-
19
Worst-case latency analysis for AVB traffic under overlapping-based time-triggered windows in time-sensitive networks
Published 2022“…In this paper, a worst-case end-to-end delay (WCD) for AVB traffic under overlapping-based TT windows (AVB-OBTTW) algorithm is proposed. …”
Get full text
Get full text
Article -
20
Computational stylometric model for oath and oath-like expressions in Quranic text
Published 2014“…This work proposes an oath-like expression detection algorithm (OLEDA) to develop a computational stylometric model for oaths based on stylometric applicationspecific features which are structural and content-specific features. …”
Get full text
Get full text
Thesis
