Search Results - (( user extraction method algorithm ) OR ( using solution using algorithm ))

Refine Results
  1. 1

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…In this research, VoIP security was enhanced via a proposed cryptographic system. The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…On the other hand, the existing personalized news recommendation systems do not make an attempt to filter the number of news items to recommend based on the reading rate behavior of a user. Moreover, early researches only consider explicit profile, short-term profile, and long-term profile of a user but none of them use all of the above user profiles in a single solution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…However, the key question is that, which data best describe the user’s intention to purchase. Many of the algorithms examine user’s past activities and traits to predict the buying intention. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…It was observed that, by using the Decision Tree and Random Forest algorithm 100% accuracy was achieved, when the smartphone was placed at the thigh during stair movement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Geometric-RANSAC position estimation method for enhanced indoor positioning using multipath signals for single base station systems by Manap, Zahariah, Awang Md Isa, Azmi, Darsono, Abd Majid, Zainuddin, Suraya, Mohd Sultan, Juwita, Attiah, Mothana Lafta

    Published 2025
    “…As the demand for location-based services in indoor settings increases, developing accurate indoor positioning systems becomes crucial to accommodating user requirements. Numerous works have proposed methods to mitigate the effect of multipath error on indoor positioning accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
    Get full text
    Get full text
    Article
  12. 12

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…An algorithm vision based page segmentation algorithm will be implemented in this system to extract the data from multiple websites and will be displayed in new website. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    BRAIN ACTIVITIES FOR MOTOR MOVEMENT by ., WAFAA ELSAYED ELBASTY

    Published 2012
    “…The Feature extraction method MVAAR couldn’t extract the actual feature for the four movements so we couldn’t classify between them.…”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB) by Hashim, Nurul Akmal

    Published 2017
    “…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20