Search Results - (( course evaluation tree algorithm ) OR ( user identification search algorithm ))

Refine Results
  1. 1

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
    Article
  4. 4

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik by Fadhilah, Mat Yamin

    Published 2002
    “…However, due to information overload, some search engines are still incapable of returning only the most relevant documents to the users. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An improved framework for content-based spamdexing detection by Shahzad, Asim, Mahdin, Hairulnizam, Mohd Nawi, Nazri

    Published 2020
    “…This article is an attempt in that direction, where a framework has been proposed for spam web pages identification. The framework uses Stop words, Keywords Density, Spam Keywords Database, Part of Speech (POS) ratio, and Copied Content algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An artificial intelligence approach to monitor student performance and devise preventive measures by Khan I., Ahmad A.R., Jabeur N., Mahdi M.N.

    Published 2023
    “…We developed a set of prediction models with distinct machine learning algorithms. Decision tree triumph over other models and thus is further transformed into easily explicable format. …”
    Article
  14. 14
  15. 15

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…In addition, the improved WOA is developed by using Cauchy mutation and local search algorithm to solve its local optima problem and improve population diversity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. Moreover, this work is extended to integrate the SPX crossover operator with the adaptive ARDE algorithm in a new way of implementation in order to make the adaptive ARDE algorithm satisfy both the global and local search requirements. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new search and extraction technique for motion capture data by Mohamad, Rafidei

    Published 2008
    “…A total of sixteen "Silat Olahraga" motion samples simulating four different motion categories were collected and stored as a motion capture database. The process of identification and extraction of logically related motions scattered within the data set called content-based retrieval method was performed to return results to the user. …”
    Get full text
    Get full text
    Thesis