Search Results - (( java implication based algorithm ) OR ( user extraction via algorithm ))
Search alternatives:
- implication based »
- java implication »
- user extraction »
- extraction via »
- via algorithm »
-
1
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…To solve this problem, online Clothing Shopbots via Web Content Extraction is developed so it can help user to reduce the time and money consumed to compare the prices because all the items and prices from multiple websites can be compared in just one website to ease the user or customer. …”
Get full text
Get full text
Thesis -
2
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
3
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
4
Sizes of Superpixels and their Effect on Interactive Segmentation
Published 2021“…Semi-automated segmentation, also known as interactive image segmentation, is an algorithm that extracts a region of interest (ROI) from an image based on user input. …”
Get full text
Get full text
Get full text
Proceeding -
5
Sizes of Superpixels and their Effect on Interactive Segmentation
Published 2021“…Semi-automated segmentation, also known as interactive image segmentation, is an algorithm that extracts a region of interest (ROI) from an image based on user input. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…In this research, VoIP security was enhanced via a proposed cryptographic system. The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
9
-
10
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022“…The first proposed algorithm aims to optimize the EE by controlling the on/off status of RRH via a deep Q network (DQN) and subsequently solving a power optimization problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023Article -
12
Smart diagnosis of long bone tumor / Mazni Parimin
Published 2005“…The construction of this prototype consist of neural network training and testing process, where the backpropagation training algorithm are used to recognize the data sample provided via a user-friendly interfaces. …”
Get full text
Get full text
Student Project -
13
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
14
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…In most cases, the position controllers rarely utilize geometrical drawing such as CAD/CAM trajectory as input reference without extensive programming or trajectory generation algorithm. Thus, this thesis aims to integrate directly the trajectory in G-code form of *.txt format as input reference for the position controller algorithm designed in MATLAB/Simulink via development of a system interpreter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…This algorithm has the ability of extract the data from GPS receiver and communicate via RS232 to test the interaction from GPS receiver. …”
Get full text
Get full text
Thesis -
17
Attendance management system with half-covered and full-facial recognition feature
Published 2023“…Users are able to take attendance via the application with or without a face mask.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
20
Contactless palmprint verification using siamese networks
Published 2022“…The four main stages are – Palmprint Image Input, Region of interest segmentation, Feature extraction and Verification. The novelties of this project are the algorithm used to segment the feature abundant region of interest from the palm image, and also the usage of a custom-built Siamese Network utilising a state-of-the-art CNN called EfficientNet as the underlying feature extractor. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
