Search Results - (( word detection method algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…In addition, the sentences relevance identification module requires some degree of linguistic pre-processing, including part of speech tagging (POS), word stemming and stop-words removal. iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluating the effect of voice activity detection in isolated Yoruba Word Recognition System by Aibinu, Abiodun Musa, Salami, Momoh Jimoh Eyiomika, Najeeb, Athaur Rahman, Azeez, J. F., Rajin, S. M. Ataul Karim

    Published 2011
    “…This paper discusses and evaluates the effect of voice Activity Detection (VAD) in an isolated Yoruba word ecognition system (IYWRS). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Ensemble based categorization and adaptive model for malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2011
    “…Current malware detection method involved string search algorithm which based on the pattern detection. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-time Malaysian automatic license plate recognition using hybrid fuzzy logic with skew detection and correction method by Al-Faqheri, Wisam Salah

    Published 2010
    “…The third preprocessing step is a new Skew Detection and Correction (SDC) method proposed to correct the skewness of license plate image. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar by Abu Bakar, Zamri

    Published 2023
    “…To achieve the objective, this research explores a linguistic method for extracting compound word from standard Malay corpus. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analysis of Motion Detection using Social Force Model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali, Mohd Falfazli, Mat Jusof

    Published 2013
    “…This paper presents a method for the detection of abnormality in crowded scenes based on Social Force Model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Image segmentation for songket motif / Zati Iwani Zaharudin by Zaharudin, Zati Iwani

    Published 2007
    “…After process of comparing the three methods of image segmentation; region growing, edge detection and watershed segmentation, most appropriate method has been chosen and implemented it in prototype module. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Recognition of multi-type and multi-oriented text in videos / Sangheeta Roy by Sangheeta , Roy

    Published 2018
    “…Then detected words are used for keyword spotting in the video to retrieve the video frames efficiently. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Passive forward scattering radar using digital video broadcasting satellite signal for drone detection by Raja Abdullah, Raja Syamsul Azmir, Musa, Surajo Alhaji, Abdul Rashid, Nur Emileen, Sali, Aduwati, Ahmad Salah, Asem, Ismail, Alyani

    Published 2020
    “…Therefore, this paper proposes a unique method by leveraging the advantage of forward-scattering radar (FSR) topology and characteristics to detect a drone; in other words, the system is known as a passive FSR (p-FSR) system. …”
    Get full text
    Get full text
    Article
  20. 20

    SMSAD: a framework for spam message and spam account detection by Adewole, Kayode Sakariyah, Anuar, Nor Badrul, Kamsin, Amirrudin, Sangaiah, Arun Kumar

    Published 2019
    “…However, the traditional content-based methods for spam detection degraded in performance due to many factors. …”
    Get full text
    Get full text
    Article