Search Results - (( based evaluations _ algorithm ) OR ( user identification ((rsa algorithm) OR (new algorithm)) ))

Refine Results
  1. 1

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. Moreover, this work is extended to integrate the SPX crossover operator with the adaptive ARDE algorithm in a new way of implementation in order to make the adaptive ARDE algorithm satisfy both the global and local search requirements. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA authentication mechanisms in control grid computing environment using Gridsim toolkit by Ismail, Saiful Adli, Ngadi, Md Asri, Mohd Sharif, Johan, Kama, Mohd Nazri, Sarkan, Haslina

    Published 2015
    “…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System by Syazana Itqan, Khalid, Syafeeza, Ahmad Radzi, Norhashimah, Mohd Saad

    Published 2016
    “…This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…Accordingly, this paper describes a new self-calibration methodology for nonlinear pressure sensors based on an LMBP-ANN model. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Image segmentation method for boundary detection of breast thermography using random walkers by Moghbel, Mehrdad

    Published 2013
    “…All images used for this study were captured by state of the art forward looking infrared (FLIR) thermal cameras and have good resolution and sensitivity. The developed algorithm needs no human intervention until the final result is displayed to the user, if the user is not satisfied with the segmentation results he/ she can appoint new seeds interactively to fine tune the segmentation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of Online Social Network Connections for Identification of Influential Users by Al-Garadi, Mohammed Ali, Varathan, Kasturi Dewi, Ravana, Sri Devi, Ahmed, Ejaz, Mujtaba, Ghulam, Khan, Muhammad Usman Shahid, Khan, Samee U.

    Published 2018
    “…This article presents a detailed survey of influential usersidentification algorithms and their performance evaluation approaches in OSNs. …”
    Get full text
    Get full text
    Article
  11. 11

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article
  12. 12

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…Several systems require full identification of a user, as any misclassification may deteriorate the performance of the entire system. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Unfortunately, password or personal identification number (PIN) verification suffers an inherent problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Automated music chord recognition system using Convolutional Neural Network (CNN) / Abdul Qhadir Jailani Azhari by Azhari, Abdul Qhadir Jailani

    Published 2025
    “…To overcome these issues, the study uses CNNs to extract features and enhance chord identification performance. The main objectives include analysing existing chord recognition algorithms, creating a prototype for real-time chord identification, and testing its performance with music recordings. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A language identifier for Indonesian and Malay text document by Indra, Z., Jaafar, J., Zamin, N., Bakar, Z.A.

    Published 2016
    “…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A language identifier for Indonesian and Malay text document by Indra, Z., Jaafar, J., Zamin, N., Bakar, Z.A.

    Published 2016
    “…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item