Search Results - (( topic identification using algorithm ) OR ( java application path algorithm ))
Search alternatives:
- topic identification »
- identification using »
- java application »
- application path »
- using algorithm »
- path algorithm »
-
1
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…Most existing topic identification methods depend on occurrence of terms in the text. …”
Get full text
Get full text
Get full text
Thesis -
2
Topic identification method for textual document
Published 2017“…This paper proposes a topic identification method that filters the important terms from the preprocessed text and applied term weighting scheme to solve synonym problem.A rule generation algorithm is used to determine the appropriate topics based on the weighted terms.The text document used in the experiment is the English translated Quran.The topics identified from the proposed method were compared with topics identified using Rough Set and domain experts. …”
Get full text
Get full text
Get full text
Article -
3
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
4
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
5
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
Get full text
Get full text
Thesis -
11
Speech processing for makhraj recognition (design adaptive filter for noise removal)
Published 2010“…Least Mean Square (LMS) Algorithm based on Adaptive Filter technique is used to remove noise. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Human identification system based on moment invariant features
Published 2012“…The feature extraction is done using affine moment invariants of full body and head-shoulder of the extracted foreground objects and these were used to identify human. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
A Genetic-CBR Approach for Cross-Document Relationship Identification
Published 2012Get full text
Get full text
Get full text
Book Chapter -
14
Autonomous Camera Alignment System
Published 2017“…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
Get full text
Get full text
Final Year Project -
15
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…WEKA program application was used for main chain angles (Phi and Psi) data classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…In the modern-day, improvements in the fields of artificial intelligence and soft computing have led to the field of automatic plant recognition being considered as a challenging topic due to the various uses of plants in medicine, food and industry. …”
Get full text
Get full text
Thesis -
17
KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data
Published 2021“…To cope with this challenge, numerous supervised and unsupervised approaches have been devised. The existing topical clustering-based approaches for keyphrase extraction are domain dependent and overlooks semantic similarity between candidate features while extracting the topical phrases. …”
Get full text
Get full text
Article -
18
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. Clustering includes the identification of subsets of the data that are similar. …”
Get full text
Get full text
Thesis -
19
A Review on EMG Signal Classification and Applications
Published 2022“…However, the proper algorithm to classify human movements from raw EMG signals has been an interesting and challenging topic to researchers. …”
Get full text
Get full text
Get full text
Article -
20
Fingerprint frontier: the evolution of biometric security
Published 2023“…The field of fingerprint biometrics is a cornerstone in the quest for accurate and efficient identity verification in today's growing landscape of security and identification technology. It have been used as a unique identifier for ages, but in our modern era, It have emerged as a cornerstone in the area of security and identity. …”
Get full text
Get full text
Get full text
Book
