Search Results - (( rate estimation methods algorithm ) OR ( user identification search algorithm ))

Refine Results
  1. 1

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…The simulation results show the effectiveness of the ARDE method over other conventional techniques, transcending the limits of the existing state-of-the-art algorithms in estimating the parameters of robot. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
    Article
  5. 5

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
    Get full text
    Get full text
    Article
  8. 8

    Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik by Fadhilah, Mat Yamin

    Published 2002
    “…However, due to information overload, some search engines are still incapable of returning only the most relevant documents to the users. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    COMPARATIVE ANALYSIS OF OPTICAL FLOW MEASUREMENT TECHNIQUE by NIZAM AKBAR, AMAR NAZMI ZULKARNAIN

    Published 2017
    “…At that time, there was no accurate method to estimate the flow rate of the hydrocarbon leakage. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An improved framework for content-based spamdexing detection by Shahzad, Asim, Mahdin, Hairulnizam, Mohd Nawi, Nazri

    Published 2020
    “…This article is an attempt in that direction, where a framework has been proposed for spam web pages identification. The framework uses Stop words, Keywords Density, Spam Keywords Database, Part of Speech (POS) ratio, and Copied Content algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Fast adaptive motion estimation search algorithm for H.264 encoder by Patwary, Md Anwarul Kaium

    Published 2012
    “…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems by Ahmad, Hasan, Motakabber, S. M. A., Anwar, Farhat, Habaebi, Mohamed Hadi, Ibrahimy, Muhammad Ibn

    Published 2021
    “…Some of the most popular methods used in cellular communication for channel estimation are the Least Squares (LS) algorithm and the Minimum Mean Square Error (MMSE) algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20