Search Results - (( word detection using algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  2. 2

    Development of real-time pose estimation algorithm for Quranic Arabic word by Mohd Esa, Luqman Naim, Morshidi, Malik Arman, Mohd Zailani, Syarah Munirah

    Published 2017
    “…The study carried out in this report proposes the best keypoint detection, description, and pose estimation algorithm combination for Quranic Arabic words. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad by Ahmad, Azriana

    Published 1999
    “…Then, using these words in the experiment on the stemming algorithm is tested employing all the possible combination of affixes rules. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of pose estimation algorithm for Quranic Arabic word by Mohd Esa, Luqman Naim, Morshidi, Malik Arman, Mohd Zailani, Syarah Munirah

    Published 2018
    “…The study carried out in this report proposes the best keypoint detection, description, and pose estimation algorithm combination for Quranic Arabic words. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Error Detection of Personalized English Isolated-Word Using Support Vector Machine by Yap, David F. W.

    Published 2012
    “…Subsequently, a well-known classification type of artificial intelligent algorithm namely Support Vector Machine (SVM) is used to evaluate those features under two class types of words with proper segregation of correct and erroneous words in two data sets. …”
    Get full text
    Get full text
    Article
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    THE INVESTIGATION ON ARABIC WORD POSE ESTIMATION ALGORITHM AS MARKER FOR AUGMENTED REALITY APPLICATION by Mohd Zailani, Syarah Munirah, Morshidi, Malik Arman

    Published 2018
    “…The study also demonstrates that one sub-words shows a better accuracy rate than with two sub-words cause by unnecessary interest points detected.…”
    Get full text
    Get full text
    Monograph
  13. 13

    Evaluating endpoint detection algorithms for isolated word from Malay parliamentary speech by Seman N., Bakar Z.A., Bakar N.A., Mohamed H.F., Abdullah N.A.S., Ramakrisnan P., Ahmad S.M.S.

    Published 2023
    “…This paper presents the endpoint detection approaches specifically for an isolated word uses Malay spoken speeches from Malaysian Parliamentary session. …”
    Conference paper
  14. 14

    A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan by Vithyatheri , Govindan

    Published 2024
    “…Many past studies employed various techniques and approaches to detect sarcasm. Even though hyperbole is one of the common approaches used individually or combined with other approaches such as lexical or pragmatic, not all types of hyperboles were used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Applying learning to filter text by Sainin, Mohd Shamrie

    Published 2005
    “…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Prevention of Textual Plagiarism Application by Mohd Nor, Nor Atikah

    Published 2011
    “…Thus, the main focus of this project is to perform a study on how to detect textual plagiarism. Word -for- word plagiarism is the most noticeable and serious form of plagiarism. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19
  20. 20

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item