Search Results - (( course evaluation tool algorithm ) OR ( user identification search algorithm ))
Search alternatives:
- identification search »
- user identification »
- course evaluation »
- evaluation tool »
- tool algorithm »
-
1
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
Get full text
Get full text
Conference or Workshop Item -
2
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
3
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
Article -
4
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
5
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
6
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…However, due to information overload, some search engines are still incapable of returning only the most relevant documents to the users. …”
Get full text
Get full text
Get full text
Thesis -
7
Evaluate the performance of university timetabling problem with various artificial intelligence techniques
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
Get full text
Get full text
Article -
9
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013Get full text
Get full text
Get full text
Citation Index Journal -
10
An improved framework for content-based spamdexing detection
Published 2020“…This article is an attempt in that direction, where a framework has been proposed for spam web pages identification. The framework uses Stop words, Keywords Density, Spam Keywords Database, Part of Speech (POS) ratio, and Copied Content algorithms. …”
Get full text
Get full text
Get full text
Article -
11
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
14
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. …”
Get full text
Get full text
Article -
15
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
16
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…In addition, the improved WOA is developed by using Cauchy mutation and local search algorithm to solve its local optima problem and improve population diversity. …”
Get full text
Get full text
Get full text
Thesis -
18
CSC649 - Special Topics in Computer Science / College of Computing, Informatics and Media
Published 2022“…The course will cover specialized technology and described in terms of frameworks and problem formulations, standard models, methods, computational tools, algorithms, as well as methodologies to evaluate the system and select optimal models. …”
Get full text
Get full text
Get full text
Teaching Resource -
19
CSC649: Special Topics in Computer Science / College of Computing, Informatics and Mathematics
Published 2018“…The course will cover specialized technology and described in terms of frameworks and problem formulations, standard models, methods, computational tools, algorithms, as well as methodologies to evaluate the system and select optimal models. …”
Get full text
Get full text
Get full text
Teaching Resource -
20
