Search Results - (( _ evaluation a algorithm ) OR ( user identification ((system algorithm) OR (based algorithm)) ))
Search alternatives:
- user identification »
- system algorithm »
- evaluation a »
- a algorithm »
-
1
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
2
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
3
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
Get full text
Get full text
Article -
4
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. …”
Get full text
Get full text
Thesis -
5
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
Get full text
Get full text
Student Project -
6
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…IDTU was developed on greedy approach by using graph sketches to improve the selection of influencers that maximize influence spread to a set of target users. Moreover, the influencer identification based on specific needs was implemented using a General Additive Model on four fundamental centralities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…The main objective of this paper was to identify the best path selection based on multiple criteria instead of a single criterion. Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
9
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Get full text
Article -
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
11
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
12
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. …”
Get full text
Get full text
Conference or Workshop Item -
13
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…The article that related to this study were identified and described based on the chosen algorithm, objectives, problems, and the significance. …”
Get full text
Get full text
Thesis -
14
A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System
Published 2016“…The research on face recognition still continues after several decades since the study of this biometric trait exists. This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
Get full text
Get full text
Get full text
Article -
15
Hardware And Software Development Of ECG Biometric System
Published 2018“…In this project, Pan-Tompkins algorithm is used as feature extraction technique of ECG fiducial points while artificial neural network is used for identification system. …”
Get full text
Get full text
Monograph -
16
Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system
Published 2009“…Simulation results show that, in the downlink 3GPP LTE system supporting video streaming services, maximum-largest weighted delay first (M-LWDF) algorithm outperforms other packet scheduling algorithms by providing a higher system throughput, supporting a higher number of users and guaranteeing fairness at a satisfactory level.…”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…Based on the result comparison of the residual signal before filter and after filter, the algorithm of FDI is able to identify parts of the system that experience failure and the fault can be solved immediately allowing the Quadrotor to be back to its normal operation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE
Published 2017“…The l*a*b colour space also being compared with the RGB colour space to evaluate which colour space gave a linear result to calculate the error calculation. …”
Get full text
Get full text
Final Year Project -
19
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
