Search Results - (( user evaluation method algorithm ) OR ( using extraction method algorithm ))
Search alternatives:
- extraction method »
- method algorithm »
- using extraction »
- user evaluation »
-
1
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
2
Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding
Published 2022“…This study proposes a method for finding similar news articles that can be used in conjunction with other methods already in use.…”
Get full text
Get full text
Get full text
Article -
3
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
Get full text
Get full text
Article -
5
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
6
Spam image filtering algorithm / Muhammad Hazim Shahimi
Published 2015“…It has shown that the proposed algorithm is good in classifying the images. There are some improvements that can be suggested for future works such as use more data, apply the better OCR technique, use another image feature extraction, and use another classifier.…”
Get full text
Get full text
Thesis -
7
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
8
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
9
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
Get full text
Get full text
Thesis -
10
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
11
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
13
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
14
Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin
Published 2021“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Thesis -
15
Image Stitching Of Aerial Footage
Published 2021“…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…The last method is the Support Vector Machine (SVM) classifier where Mel Frequency Cepstral Coefficients (MFCC) is the extracted features used to train the classifier. …”
Get full text
Get full text
Monograph -
20
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
Get full text
Get full text
Get full text
Thesis
