Search Results - (( based evaluation from algorithm ) OR ( user identification new algorithm ))
Search alternatives:
- user identification »
- identification new »
- based evaluation »
- evaluation from »
- from algorithm »
- new algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
2
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
Get full text
Get full text
Get full text
Thesis -
3
A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System
Published 2016“…Evaluation was carried out using the images of 40 subjects from AT & T database and 10 subjects from JAFFE database producing 100% accuracy with less than 1 minute average training time when inserting 1 to 10 new subjects into the system.…”
Get full text
Get full text
Get full text
Article -
4
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…Accordingly, this paper describes a new self-calibration methodology for nonlinear pressure sensors based on an LMBP-ANN model. …”
Get full text
Get full text
Get full text
Article -
5
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
7
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
8
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
9
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…Several systems require full identification of a user, as any misclassification may deteriorate the performance of the entire system. …”
Get full text
Get full text
Article -
10
-
11
-
12
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Unfortunately, password or personal identification number (PIN) verification suffers an inherent problem. …”
Get full text
Get full text
Thesis -
13
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
14
Automated music chord recognition system using Convolutional Neural Network (CNN) / Abdul Qhadir Jailani Azhari
Published 2025“…To overcome these issues, the study uses CNNs to extract features and enhance chord identification performance. The main objectives include analysing existing chord recognition algorithms, creating a prototype for real-time chord identification, and testing its performance with music recordings. …”
Get full text
Get full text
Thesis -
15
Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin
Published 2015“…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
Get full text
Get full text
Thesis -
16
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE is also used to develop a new dynamic parameter identification framework to estimate the barycentric parameters of the CRS A456 robot manipulator. …”
Get full text
Get full text
Thesis -
17
A language identifier for Indonesian and Malay text document
Published 2016“…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
18
A language identifier for Indonesian and Malay text document
Published 2016“…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…Aspect extraction, also known as opinion target extraction, is the fine-grained identification of users’ opinion targets, such as the extraction of opinionated product aspects from customer reviews. …”
Get full text
Get full text
Get full text
Thesis
