Search Results - (( word detection method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- word detection »
- using function »
-
1
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…In addition, the sentences relevance identification module requires some degree of linguistic pre-processing, including part of speech tagging (POS), word stemming and stop-words removal. iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
Get full text
Get full text
Thesis -
2
Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model
Published 2004“…A typical or fixed sigmoid function method is used in learning phase. In the recognition phase, an adaptive sigmoid function is employed. …”
Get full text
Get full text
Thesis -
3
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
Get full text
Get full text
Article -
4
Determining gender differential item functioning for mathematics in coeducational school culture
Published 2018“…By employing the software WINSTEPS version 3.67.0 that is based on the Rasch Model for dichotomous responses, Differential Item Functioning analysis was conducted by using Mantel-Haenszel Chi-square method. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
Get full text
Get full text
Thesis -
7
Evaluating the effect of voice activity detection in isolated Yoruba Word Recognition System
Published 2011“…This paper discusses and evaluates the effect of voice Activity Detection (VAD) in an isolated Yoruba word ecognition system (IYWRS). …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
Get full text
Get full text
Thesis -
9
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
10
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
11
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
12
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
14
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
15
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
16
Real-time Malaysian automatic license plate recognition using hybrid fuzzy logic with skew detection and correction method
Published 2010“…The third preprocessing step is a new Skew Detection and Correction (SDC) method proposed to correct the skewness of license plate image. …”
Get full text
Get full text
Thesis -
17
Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar
Published 2023“…To achieve the objective, this research explores a linguistic method for extracting compound word from standard Malay corpus. …”
Get full text
Get full text
Thesis -
18
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
19
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
20
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis
