Search Results - (( user extraction research algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. A user testing to validate the framework shows that users’ perception of haptic feedback differs depending on the different type of rendering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2014
    “…With the increasing number of mobile users, which currently is estimated to be about 500million users by 2015 according to a study done by the Yankee Group in 2011, the main objective of this study is to review studies on mobile banking usability factors and graphical user authentication algorithms on the suitable algorithm to be adopted for mobile banking user authentication. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A review on classifying and prioritizing user review-based software requirements by Salleh, Amran, Said, Mar Yah, Osman, Mohd Hafeez, Hassan, Sa’Adah

    Published 2024
    “…However, extracting and analyzing user requirements from user reviews is ineffective due to the large volume, unstructured nature, and varying quality of the reviews. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Sizes of Superpixels and their Effect on Interactive Segmentation by Goh, Kok Luong, Ng, Giap Weng, Muzaffar, Hamzah, Chai, Soo See

    Published 2021
    “…Semi-automated segmentation, also known as interactive image segmentation, is an algorithm that extracts a region of interest (ROI) from an image based on user input. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  9. 9
  10. 10

    Sizes of Superpixels and their Effect on Interactive Segmentation by Kok, Luong Goh, Giap, Weng Ng, Muzaffar Hamzah, Soo, See Chai

    Published 2021
    “…Semi-automated segmentation, also known as interactive image segmentation, is an algorithm that extracts a region of interest (ROI) from an image based on user input. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  11. 11

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…However, to protect sensitive information, reliable and secure communication techniques are necessary in many real world situations. This research offers a user-friendly interface for securely embedding and extracting secret information within digital images. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…The development of Graphical User Interface (GUI) for classification of Artocarpus species help user to identify and differentiate the species in faster and easier way especially botanist, taxonomist, and researcher. …”
    Get full text
    Undergraduate Final Project Report
  14. 14

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…The development and evaluation of the prediction system adhere to a comprehensive research methodology encompassing data understanding, description, preprocessing, feature extraction, and model evaluation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Product Recommendation System (Targeted Recommendation using Deep Learning in Computer Vision) by Sharvinteraan, C. Mogan

    Published 2023
    “…Once the face is successfully recognized, a classifier model is employed to predict the user's age and gender based on the extracted features. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    BRAIN ACTIVITIES FOR MOTOR MOVEMENT by ., WAFAA ELSAYED ELBASTY

    Published 2012
    “…The research covers the procedure of designing the BCI algorithm and this consists of three stages firstly recording EEG brain signals, secondly EEG signals pre-processing, Last stage is EEG signals classification. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18
  19. 19

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…On the other hand, the existing personalized news recommendation systems do not make an attempt to filter the number of news items to recommend based on the reading rate behavior of a user. Moreover, early researches only consider explicit profile, short-term profile, and long-term profile of a user but none of them use all of the above user profiles in a single solution. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multilingual Ontology Learning Algorithm for Emails by Beseiso M., Ahmad A.R., Ismail R., Taher M.

    Published 2023
    “…This will lead to intelligent applications and information extraction for email users while keeping the semantic layer opaque to the end user. � Springer-Verlag Berlin Heidelberg 2013.…”
    Conference paper