Search Results - (( _ evaluation method algorithm ) OR ( user identification system algorithm ))*
Search alternatives:
- identification system »
- user identification »
- method algorithm »
- system algorithm »
-
1
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
2
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
3
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
Get full text
Get full text
Article -
4
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
Get full text
Get full text
Thesis -
5
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
6
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…Evaluation on IDTU was performed against 3 greedy and 6 heuristics benchmark algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
9
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Get full text
Article -
10
A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System
Published 2016“…This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
Get full text
Get full text
Get full text
Article -
11
Face detection of thermal images based on color image processing
Published 2012“…Finally, all the different steps are merged into an integrated system for full face detection. The system is evaluated based on accuracy and performance.…”
Get full text
Get full text
Undergraduates Project Papers -
12
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Findings: Experiments with Sigmod and IMDB datasets were conducted to evaluate the effectiveness of the method. The experimental result shows that the XKQSS is about 20% more effective than XReal in terms of return nodes identification, a state-of-art systems for XML retrieval. …”
Get full text
Get full text
Article -
13
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
14
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. …”
Get full text
Get full text
Conference or Workshop Item -
15
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
16
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
17
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…Fault Detection and Identification (FDI) monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Online fingerprint recognition
Published 2010“…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
Get full text
Get full text
Undergraduates Project Papers -
20
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project
