Search Results - (( topic identification using algorithm ) OR ( java application bee algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…Most existing topic identification methods depend on occurrence of terms in the text. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Topic identification method for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…This paper proposes a topic identification method that filters the important terms from the preprocessed text and applied term weighting scheme to solve synonym problem.A rule generation algorithm is used to determine the appropriate topics based on the weighted terms.The text document used in the experiment is the English translated Quran.The topics identified from the proposed method were compared with topics identified using Rough Set and domain experts. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor by Nik Mangsor, Nik Siti Madihah

    Published 2023
    “…Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Speech processing for makhraj recognition (design adaptive filter for noise removal) by Siti Nurmaisarah, Abdul Aziz

    Published 2010
    “…Least Mean Square (LMS) Algorithm based on Adaptive Filter technique is used to remove noise. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Human identification system based on moment invariant features by Mohd Ibrahim, Azhar, Shafie, Amir Akramin, Rashid, Muhammad Mahbubur

    Published 2012
    “…The feature extraction is done using affine moment invariants of full body and head-shoulder of the extracted foreground objects and these were used to identify human. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Autonomous Camera Alignment System by Salehian, Sina

    Published 2017
    “…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…WEKA program application was used for main chain angles (Phi and Psi) data classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…In the modern-day, improvements in the fields of artificial intelligence and soft computing have led to the field of automatic plant recognition being considered as a challenging topic due to the various uses of plants in medicine, food and industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data by Aman, M., Abdulkadir, S.J., Aziz, I.A., Alhussian, H., Ullah, I.

    Published 2021
    “…To cope with this challenge, numerous supervised and unsupervised approaches have been devised. The existing topical clustering-based approaches for keyphrase extraction are domain dependent and overlooks semantic similarity between candidate features while extracting the topical phrases. …”
    Get full text
    Get full text
    Article
  15. 15

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. Clustering includes the identification of subsets of the data that are similar. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Review on EMG Signal Classification and Applications by Wan Ting, Evon Lim, Almon, Chai, Phei Chin, Lim

    Published 2022
    “…However, the proper algorithm to classify human movements from raw EMG signals has been an interesting and challenging topic to researchers. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…The field of fingerprint biometrics is a cornerstone in the quest for accurate and efficient identity verification in today's growing landscape of security and identification technology. It have been used as a unique identifier for ages, but in our modern era, It have emerged as a cornerstone in the area of security and identity. …”
    Get full text
    Get full text
    Get full text
    Book
  18. 18
  19. 19

    Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory by Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha, Yusoff, Siti Hajar

    Published 2018
    “…The proposed study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. Furthermore, it does not use any complex cryptographic protocols that tend to increase network overhead. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Control of grain drying process using self-tuning quantitative feedback theory by Mansor, Hasmah

    Published 2011
    “…A laboratory scale conveyor belt type grain dryer was specially fabricated for this study. System identification technique which utilised experimental input/output data was used to model the grain dryer plant. …”
    Get full text
    Get full text
    Thesis