Search Results - (( based evaluation case algorithm ) OR ( user identification _ algorithm ))*
Search alternatives:
- user identification »
- based evaluation »
- evaluation case »
- case algorithm »
-
1
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
Get full text
Get full text
Thesis -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Evaluation of Instagram's neural machine translation for literary texts: an MQM-Based Analysis
Published 2024“…Addressing the global increase in social media users, platforms such as Instagram introduced automatic translation to broaden information dissemination and improve cross-cultural communication. …”
Get full text
Get full text
Get full text
Article -
4
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…The performance of the proposed method was evaluated by a board of three professional radiologists and the final decision was based on the majority agreement. …”
Get full text
Get full text
Thesis -
5
Zero distortion-based steganography for handwritten signature
Published 2018“…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
Get full text
Get full text
Get full text
Thesis -
6
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
7
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
8
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
9
-
10
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…In conclusion, the study successfully identifies key features in warehouses routing, implements ACO and GA algorithms, and evaluates the performance based on achieved routes and distance.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
14
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
16
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
17
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
18
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
19
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
20
