Search Results - (( word detection using algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- word detection »
-
1
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
2
Development of real-time pose estimation algorithm for Quranic Arabic word
Published 2017“…The study carried out in this report proposes the best keypoint detection, description, and pose estimation algorithm combination for Quranic Arabic words. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…Then, using these words in the experiment on the stemming algorithm is tested employing all the possible combination of affixes rules. …”
Get full text
Get full text
Thesis -
4
Development of pose estimation algorithm for Quranic Arabic word
Published 2018“…The study carried out in this report proposes the best keypoint detection, description, and pose estimation algorithm combination for Quranic Arabic words. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
6
Error Detection of Personalized English Isolated-Word Using Support Vector Machine
Published 2012“…Subsequently, a well-known classification type of artificial intelligent algorithm namely Support Vector Machine (SVM) is used to evaluate those features under two class types of words with proper segregation of correct and erroneous words in two data sets. …”
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
Get full text
Get full text
Thesis -
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Evaluating the effect of voice activity detection in isolated Yoruba Word Recognition System
Published 2011“…Artificial Neural Network algorithms are then used to classify these features. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
THE INVESTIGATION ON ARABIC WORD POSE ESTIMATION ALGORITHM AS MARKER FOR AUGMENTED REALITY APPLICATION
Published 2018“…The study also demonstrates that one sub-words shows a better accuracy rate than with two sub-words cause by unnecessary interest points detected.…”
Get full text
Get full text
Monograph -
13
Evaluating endpoint detection algorithms for isolated word from Malay parliamentary speech
Published 2023“…This paper presents the endpoint detection approaches specifically for an isolated word uses Malay spoken speeches from Malaysian Parliamentary session. …”
Conference paper -
14
A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan
Published 2024“…Many past studies employed various techniques and approaches to detect sarcasm. Even though hyperbole is one of the common approaches used individually or combined with other approaches such as lexical or pragmatic, not all types of hyperboles were used. …”
Get full text
Get full text
Get full text
Thesis -
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
16
Applying learning to filter text
Published 2005“…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
Get full text
Get full text
Conference or Workshop Item -
17
Prevention of Textual Plagiarism Application
Published 2011“…Thus, the main focus of this project is to perform a study on how to detect textual plagiarism. Word -for- word plagiarism is the most noticeable and serious form of plagiarism. …”
Get full text
Get full text
Final Year Project -
18
Speech Signal Endpoint Detection Using Hidden Markov Models
Published 2006Get full text
Get full text
Article -
19
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
20
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item
