Search Results - (( _ evaluation a algorithm ) OR ( user identification system algorithm ))

Refine Results
  1. 1

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system by Mohd Ramli, Huda Adibah, Basukala, Riyaj, Sandrasegaran, Kumbesan, Patachaianand, Rachod

    Published 2009
    “…Simulation results show that, in the downlink 3GPP LTE system supporting video streaming services, maximum-largest weighted delay first (M-LWDF) algorithm outperforms other packet scheduling algorithms by providing a higher system throughput, supporting a higher number of users and guaranteeing fairness at a satisfactory level.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
    Get full text
    Get full text
    Article
  5. 5

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Hardware And Software Development Of ECG Biometric System by Chia, Pei Kiak

    Published 2018
    “…In this project, Pan-Tompkins algorithm is used as feature extraction technique of ECG fiducial points while artificial neural network is used for identification system. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Influence maximisation towards target users and minimal diffusion of information based on information needs by Temitope, Olanrewaju Abdus-Samad

    Published 2020
    “…Experimental method was used by employing five social network datasets including Epinions, Wiki-Vote, SlashDot, Facebook and Twitter from Stanford data repository. Evaluation on IDTU was performed against 3 greedy and 6 heuristics benchmark algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee by Wan Roshdee, Wan Nur Alya Athirah

    Published 2024
    “…The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System by Syazana Itqan, Khalid, Syafeeza, Ahmad Radzi, Norhashimah, Mohd Saad

    Published 2016
    “…The main purpose of this research is to develop a complete system of face recognition. A Graphical User Interface (GUI) in MATLAB links all the steps starting from image preprocessing to face identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…Furthermore, we have obtained accurate measurements of grasping mechanism. This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  16. 16

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Thus, the systems return irrelevant user search intentions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…ERP ALAR was implemented in Matlab R2009a using Genetic Algorithm (GA) with multi-objectives. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. …”
    Get full text
    Get full text
    Thesis