Search Results - (( usage extraction method algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- extraction method »
- usage extraction »
- method algorithm »
- java application »
-
1
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…The results also show low memory usage and computing power in comparison with the baseline algorithms. � 2023 THE AUTHORS…”
Article -
4
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
5
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore, in this study a coupled Multivariate Empirical Mode Decomposition (MEMD) with embedded automated artifact remover algorithm and inverse solution method is proposed. …”
Get full text
Get full text
Thesis -
6
Panoramic image matching method for uav remote sensing based on surf algorithm
Published 2024text::Final Year Project -
7
Image matching using relational graph representation
Published 2005“…Feature-based matching algorithm cannot tackle the problem of matching ambiguities easily. …”
Get full text
Get full text
Thesis -
8
Taxonomy of memory usage in swarm intelligence-based metaheuristics
Published 2019“…Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). …”
Get full text
Get full text
Get full text
Article -
9
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
10
Car plate recognition based on stroke composition technique / Samsul Setumin, Mohd Ikmal Fitri Maruzuki and Shahrul Nizam Ishak.
Published 2012“…The biggest challenge posed by the usage of this technique is that of extracting the strokes from the character images. …”
Get full text
Get full text
Research Reports -
11
-
12
Speaker recognition using neural network
Published 2012“…The feature for the speaker who has to be identified are extracted and compared with the stored templates by using Backpropagation Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Automatic Number Plate Recognition By Using Matlab
Published 2018“…Furthermore, new algorithm in MATLAB has been used to extract the vehicle number plate in various luminance condition. …”
Get full text
Get full text
Monograph -
14
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…The neural network package in Matlab software was used by this artificial intelligent method to develop a neural network classifier. Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
15
Mapreduce algorithm for weather dataset
Published 2017“…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Thesis -
16
A review on classifying and prioritizing user review-based software requirements
Published 2024“…Therefore, further research is not just necessary but crucial to effectively explore methods to gather informative and meaningful user feedback. …”
Get full text
Get full text
Get full text
Article -
17
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020“…Having documentation on the dashboard report also has been an issue when executive need to extract information manually from the dashboard. Besides, this paper also enlightens on one of the Machine Learning tools used which is R, with the utilization of K Nearest Neighbor (KNN) algorithm as method of classification for data. …”
Get full text
Get full text
Final Year Project -
18
MapReduce algorithm for weather dataset
Published 2018“…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Research Report -
19
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
20
Study of noise robustness of First Formant Bandwidth (F1BW) method
Published 2011“…Applications that use vowel phonemes require high degree of Standard Malay vowel recognition capability.In Malaysia, researches in vowel recognition is still lacking especially in the usage of Malay vowels, independent speaker systems, recognition robustness and algorithm speed and accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
