Search Results - (( user extraction method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- extraction method »
- method algorithm »
- user extraction »
- function method »
- using function »
-
1
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
2
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…By using this algorithm, the web page is segmented into several big blocks. …”
Get full text
Get full text
Thesis -
5
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…The new technique can be used to detect the aforementioned biometric traits using the same feature extraction algorithm at limited time, since each biometric trait’s dimensions was drastically reduced. …”
Get full text
Get full text
Article -
7
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
8
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
9
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
Get full text
Get full text
Thesis -
10
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…The microcontroller will be used to parse the NMEA data sentences and calculate the algorithm. …”
Get full text
Get full text
Thesis -
11
Protection of integrity and ownership of pdf documents using invisible signature
Published 2012“…Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.…”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Feature extraction and localisation using scale-invariant feature transform on 2.5D image
Published 2015“…We applied the Scale-invariant Feature Transform (SIFT) method to extract feature vectors and the Otsu’s method to obtain a general threshold value for landmark localisation. …”
Get full text
Get full text
Get full text
Article -
13
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…KMS validation was carried out through expert assessment, and the user acceptance of the KMS was evaluated using a survey method, which adopted a questionnaire from the Technology Acceptance Model (TAM) framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Correlation-based subset evaluation of feature selection for dynamic Malaysian sign language
Published 2016“…In this study, the images has been captured using a kinect sensor based skeletal algorithms. …”
Get full text
Get full text
Thesis -
15
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…All of these methods focused on a manual or semi-automatic extraction of the RV structure. …”
Get full text
Get full text
Thesis -
16
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
Get full text
Get full text
Article -
17
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
18
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
Get full text
Get full text
Get full text
Thesis -
19
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
