Search Results - (( based evaluation styles algorithm ) OR ( based information based algorithm ))
Search alternatives:
- evaluation styles »
- based information »
- information based »
- based evaluation »
- styles algorithm »
-
1
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
Get full text
Get full text
Get full text
Thesis -
2
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
3
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
4
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…For evaluation, we measured the algorithm's functionality in identifying the different strategies. …”
Get full text
Get full text
Get full text
Article -
5
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. …”
Get full text
Get full text
Get full text
Article -
6
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…The performance of the stylometry-based blind steganalysis model is then evaluated based on all false rate, missing rate and accuracy rate and compared against three other standard classifiers in steganalysis; Naive Bayes (NB), k-Nearest Neighbor (k-NN), and Decision Tree (J48). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
Published 2018“…Generally, different terminologies and different styles have been adopted for writing pseudo code for different algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…It consists of developing the appropriate research approach, methodology of negotiation and agent-based negotiation in VM. The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
Get full text
Get full text
Final Year Project -
9
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…On this paper, we empirically evaluate facial representation based totally on statistical local functions, neighborhood Binary styles, for person-independent facial expression recognition. …”
Get full text
Get full text
Final Year Project -
10
Evaluation of Instagram's neural machine translation for literary texts: an MQM-Based Analysis
Published 2024“…Subsequently, the Overall Quality Score of the error-based analysis is calculated automatically using the ContentQuo platform. …”
Get full text
Get full text
Get full text
Article -
11
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…All these design methodologies aim to confirm the effect of HDL coding style on the performance of hardware algorithms implemented on FPGA. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
14
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
Published 2015“…This technique is used to consider their learning styles and how to improve students’ performance in learning DBM1013 – Engineering, Mathematics, the questionnaires were evaluated to identify the best learning styles used by students in learning Engineering Mathematics. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
17
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
18
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
19
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
20
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In order to measure performance of the proposed algorithm, evaluation was done by several independent UCI datasets and the results were compared with RF and some individual classifiers. …”
Get full text
Get full text
Get full text
Thesis
