Search Results - (( based evaluation from algorithm ) OR ( user identification new algorithm ))

Refine Results
  1. 1

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System by Syazana Itqan, Khalid, Syafeeza, Ahmad Radzi, Norhashimah, Mohd Saad

    Published 2016
    “…Evaluation was carried out using the images of 40 subjects from AT & T database and 10 subjects from JAFFE database producing 100% accuracy with less than 1 minute average training time when inserting 1 to 10 new subjects into the system.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…Accordingly, this paper describes a new self-calibration methodology for nonlinear pressure sensors based on an LMBP-ANN model. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Analysis of Online Social Network Connections for Identification of Influential Users by Al-Garadi, Mohammed Ali, Varathan, Kasturi Dewi, Ravana, Sri Devi, Ahmed, Ejaz, Mujtaba, Ghulam, Khan, Muhammad Usman Shahid, Khan, Samee U.

    Published 2018
    “…This article presents a detailed survey of influential usersidentification algorithms and their performance evaluation approaches in OSNs. …”
    Get full text
    Get full text
    Article
  8. 8

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article
  9. 9

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…Several systems require full identification of a user, as any misclassification may deteriorate the performance of the entire system. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Unfortunately, password or personal identification number (PIN) verification suffers an inherent problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automated music chord recognition system using Convolutional Neural Network (CNN) / Abdul Qhadir Jailani Azhari by Azhari, Abdul Qhadir Jailani

    Published 2025
    “…To overcome these issues, the study uses CNNs to extract features and enhance chord identification performance. The main objectives include analysing existing chord recognition algorithms, creating a prototype for real-time chord identification, and testing its performance with music recordings. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE is also used to develop a new dynamic parameter identification framework to estimate the barycentric parameters of the CRS A456 robot manipulator. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A language identifier for Indonesian and Malay text document by Indra, Z., Jaafar, J., Zamin, N., Bakar, Z.A.

    Published 2016
    “…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A language identifier for Indonesian and Malay text document by Indra, Z., Jaafar, J., Zamin, N., Bakar, Z.A.

    Published 2016
    “…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…Aspect extraction, also known as opinion target extraction, is the fine-grained identification of users’ opinion targets, such as the extraction of opinionated product aspects from customer reviews. …”
    Get full text
    Get full text
    Get full text
    Thesis