Search Results - (( topic identification using algorithm ) OR ( java application bee algorithm ))
Search alternatives:
- topic identification »
- identification using »
- java application »
- using algorithm »
- application bee »
- bee algorithm »
-
1
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…Most existing topic identification methods depend on occurrence of terms in the text. …”
Get full text
Get full text
Get full text
Thesis -
2
Topic identification method for textual document
Published 2017“…This paper proposes a topic identification method that filters the important terms from the preprocessed text and applied term weighting scheme to solve synonym problem.A rule generation algorithm is used to determine the appropriate topics based on the weighted terms.The text document used in the experiment is the English translated Quran.The topics identified from the proposed method were compared with topics identified using Rough Set and domain experts. …”
Get full text
Get full text
Get full text
Article -
3
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
4
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
Get full text
Get full text
Thesis -
8
Speech processing for makhraj recognition (design adaptive filter for noise removal)
Published 2010“…Least Mean Square (LMS) Algorithm based on Adaptive Filter technique is used to remove noise. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Human identification system based on moment invariant features
Published 2012“…The feature extraction is done using affine moment invariants of full body and head-shoulder of the extracted foreground objects and these were used to identify human. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
A Genetic-CBR Approach for Cross-Document Relationship Identification
Published 2012Get full text
Get full text
Get full text
Book Chapter -
11
Autonomous Camera Alignment System
Published 2017“…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
Get full text
Get full text
Final Year Project -
12
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…WEKA program application was used for main chain angles (Phi and Psi) data classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…In the modern-day, improvements in the fields of artificial intelligence and soft computing have led to the field of automatic plant recognition being considered as a challenging topic due to the various uses of plants in medicine, food and industry. …”
Get full text
Get full text
Thesis -
14
KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data
Published 2021“…To cope with this challenge, numerous supervised and unsupervised approaches have been devised. The existing topical clustering-based approaches for keyphrase extraction are domain dependent and overlooks semantic similarity between candidate features while extracting the topical phrases. …”
Get full text
Get full text
Article -
15
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. Clustering includes the identification of subsets of the data that are similar. …”
Get full text
Get full text
Thesis -
16
A Review on EMG Signal Classification and Applications
Published 2022“…However, the proper algorithm to classify human movements from raw EMG signals has been an interesting and challenging topic to researchers. …”
Get full text
Get full text
Get full text
Article -
17
Fingerprint frontier: the evolution of biometric security
Published 2023“…The field of fingerprint biometrics is a cornerstone in the quest for accurate and efficient identity verification in today's growing landscape of security and identification technology. It have been used as a unique identifier for ages, but in our modern era, It have emerged as a cornerstone in the area of security and identity. …”
Get full text
Get full text
Get full text
Book -
18
A Study of the Contribution of Nearest-Neighbour Thermodynamic Parameters to the DNA Sequences Generated by Ant Colony Optimisation
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory
Published 2018“…The proposed study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. Furthermore, it does not use any complex cryptographic protocols that tend to increase network overhead. …”
Get full text
Get full text
Monograph -
20
Control of grain drying process using self-tuning quantitative feedback theory
Published 2011“…A laboratory scale conveyor belt type grain dryer was specially fabricated for this study. System identification technique which utilised experimental input/output data was used to model the grain dryer plant. …”
Get full text
Get full text
Thesis
