Search Results - (( word detection method algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- method algorithm »
- java application »
- word detection »
-
1
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…In addition, the sentences relevance identification module requires some degree of linguistic pre-processing, including part of speech tagging (POS), word stemming and stop-words removal. iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
Get full text
Get full text
Thesis -
2
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
Get full text
Get full text
Thesis -
3
Evaluating the effect of voice activity detection in isolated Yoruba Word Recognition System
Published 2011“…This paper discusses and evaluates the effect of voice Activity Detection (VAD) in an isolated Yoruba word ecognition system (IYWRS). …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
Get full text
Get full text
Thesis -
5
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
6
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
7
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
9
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
10
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
11
Real-time Malaysian automatic license plate recognition using hybrid fuzzy logic with skew detection and correction method
Published 2010“…The third preprocessing step is a new Skew Detection and Correction (SDC) method proposed to correct the skewness of license plate image. …”
Get full text
Get full text
Thesis -
12
Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar
Published 2023“…To achieve the objective, this research explores a linguistic method for extracting compound word from standard Malay corpus. …”
Get full text
Get full text
Thesis -
13
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
14
Analysis of Motion Detection using Social Force Model
Published 2013“…This paper presents a method for the detection of abnormality in crowded scenes based on Social Force Model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Image segmentation for songket motif / Zati Iwani Zaharudin
Published 2007“…After process of comparing the three methods of image segmentation; region growing, edge detection and watershed segmentation, most appropriate method has been chosen and implemented it in prototype module. …”
Get full text
Get full text
Thesis -
16
Homogeneous pin-through-hole component inspection using fringe tracking
Published 2009Get full text
Article -
17
Recognition of multi-type and multi-oriented text in videos / Sangheeta Roy
Published 2018“…Then detected words are used for keyword spotting in the video to retrieve the video frames efficiently. …”
Get full text
Get full text
Get full text
Thesis -
18
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
19
Passive forward scattering radar using digital video broadcasting satellite signal for drone detection
Published 2020“…Therefore, this paper proposes a unique method by leveraging the advantage of forward-scattering radar (FSR) topology and characteristics to detect a drone; in other words, the system is known as a passive FSR (p-FSR) system. …”
Get full text
Get full text
Article -
20
SMSAD: a framework for spam message and spam account detection
Published 2019“…However, the traditional content-based methods for spam detection degraded in performance due to many factors. …”
Get full text
Get full text
Article
