Search Results - (( solution information extraction algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    An intelligent data mapping for hydrological information system (his) cube data base to cater from various data types by Selamat, Harihodin, Mohd. Rahim, Mohd. Shafry, Daman, Daut

    Published 2004
    “…Information Extraction is a process that extracts information from existing system source and stores into a database. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Pengekstrakan data berasaskan pendekatan ontologi: kes data jujukan hidrologi by Abd. Hamid, Ahmad Ghadaffi

    Published 2005
    “…Information Extraction is a process that extracts information from existing system source and stores into a database. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Information extraction using Link Grammar by N., Zamin

    Published 2009
    “…This study investigates one of the NLP approach known as Link Grammar1 (LG) for extracting relevant information. LG appears within limited literature search to be the most suitable candidate algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…In relation to information loss, the proposed solution was able to achieve an average of 12.2% against 18.6% of the benchmark solution. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…In addition, a method of utilizing Convolutional Neural Network (CNN) is used for the detection of vehicles from roadway camera outputs to apply video processing techniques and extract the desired information. Specifically, the paper utilized the YOLOv5s architecture coupled with k-means algorithm to perform anchor box optimization under different illumination levels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…Information Extraction (IE) has been identified as a potential solution to this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…This research offers a user-friendly interface for securely embedding and extracting secret information within digital images. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Coherent crowd analysis with visual attributes / Nurul Japar by Nurul , Japar

    Published 2022
    “…This thesis first demonstrates the solution of exploiting contextual information to extract visual attributes within crowd scenes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Blockchain for Healthcare Medical Records Management System with Sharing Control by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Zabidi, Suriza Ahmad

    Published 2021
    “…Machine Learning allows the extraction of needed-only information that is relevant from data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches by Aman, M., Said, A.M., Kadir, S.J.A., Ullah, I.

    Published 2018
    “…Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. …”
    Get full text
    Get full text
    Article
  17. 17

    Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches by Aman, M., Said, A.M., Kadir, S.J.A., Ullah, I.

    Published 2018
    “…Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…In the case of spatial time series, the problem can be solved by unsupervised approaches rather than supervised classification, with appropriate preprocessing techniques to transform the actual data. The unsupervised solution using time series clustering algorithms is capable to extract valuable information and identify structure in complex and massive datasets as spatial time series. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article