Search Results - (( _ extraction method algorithm ) OR ( based information needs algorithm ))*
Search alternatives:
- extraction method »
- based information »
- method algorithm »
- needs algorithm »
-
1
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
3
Thermal Image Analysis of Holistic based Treatment
Published 2017“…Seed-point region growing method is useful for extracting informations from thermal images analysis. …”
Get full text
Get full text
Final Year Project -
4
Jogging activity recognition using k-NN algorithm
Published 2022“…The finding in this project is the k-NN algorithm is good feature extraction and classifier. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
6
Multi-scene design analysis of integrated energy system based on feature extraction algorithm
Published 2022“…The load forecasting method based on feature clustering proposed in this paper can effectively extract the influence of different environmental factors on the load forecasting results, and get more accurate load forecasting results.…”
Get full text
Get full text
Article -
7
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
Get full text
Get full text
Thesis -
8
Panoramic image matching method for uav remote sensing based on surf algorithm
Published 2024text::Final Year Project -
9
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
10
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…We first analyzed experts' written summaries, extracted the strategies used in the summaries, formulated a set of heuristics rules to define the strategies and finally transformed the rules using position-based method into summary sentence decomposition algorithm (SSDA). …”
Get full text
Get full text
Get full text
Article -
11
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Image encryption is one of the most important methods for protecting image information. With the aid of image encryption algorithms, the plaintext of the image is encrypted into the ciphertext before sending. …”
Get full text
Get full text
Thesis -
12
A Rough Set-Based Approach for Identifying and Replacing Missing Concepts in Incomplete Sentences in Computer Domain Texts
Published 2026thesis::master thesis -
13
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…The problem with the existing plant recognition system is the lack of method to find the best structure for their classifiers. …”
Get full text
Get full text
Thesis -
14
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
15
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. Furthermore, many of the companies use the signature-based detection method which is not capable of capturing more advanced attackers that use unfamiliar attacks methods. …”
Get full text
Get full text
Get full text
Thesis -
16
Overview of biomedical relations extraction using hybrid rule-based approaches.
Published 2013“…However, in this work we will discuss the overview a combination of three methods called as hybrid rule-based to extract complex and simple relations.…”
Get full text
Get full text
Get full text
Article -
17
A word stemming algorithm for Hausa language
Published 2015“…Hausa, a highly inflected language, needs a worthy stemming approach for efficient information retrieval (IR). …”
Get full text
Get full text
Article -
18
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Studies have shown how user perception can have a strong influence on policies and decision-making processes in a place, society, and nation. This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
20
A review on classifying and prioritizing user review-based software requirements
Published 2024“…Therefore, further research is not just necessary but crucial to effectively explore methods to gather informative and meaningful user feedback. …”
Get full text
Get full text
Get full text
Article
