Search Results - (( data replication methods algorithm ) OR ( traits identification method algorithm ))

Refine Results
  1. 1

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
    Get full text
    Get full text
    Get full text
    Book Section
  3. 3

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…The new technique can be used to detect the aforementioned biometric traits using the same feature extraction algorithm at limited time, since each biometric trait’s dimensions was drastically reduced. …”
    Get full text
    Get full text
    Article
  5. 5

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…Biometric technology is fast gaining popularity as means of security measures to reduce cases of fraud and theft due to its use of physical characteristics and traits for the identification of individuals. The earliest methods of biometric identification included fingerprint and handwriting while more recent ones include iris/eye scan, face scan, voice print, and hand print. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…To address this issue, various data pre-processing methods called Feature Selection (FS) techniques have been presented in the literature. …”
    Get full text
    Get full text
    Article
  11. 11

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…In addition, this technique has achieved excellent accuracies (ROC = 95%) over other methods used. Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The traditional ways that used to protect privacy such as Personal Identification Number (PIN) and smart card are getting replaced by the biometric methods due to its high risk for being forgotten and exposure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System by Syazana Itqan, Khalid, Syafeeza, Ahmad Radzi, Norhashimah, Mohd Saad

    Published 2016
    “…The research on face recognition still continues after several decades since the study of this biometric trait exists. This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    A framework for automatic modelling of survival using fuzzy inference. by Hamdan, Hazlina, Garibaldi, Jonathan M.

    Published 2012
    “…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
    Get full text
    Get full text
    Thesis
  19. 19

    HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text by Islam, Md Shofiqul, Sultana, Sunjida, Debnath, Uttam Kumar, Al Mahmud, Jubayer, Islam, S. M. Jahidul

    Published 2021
    “…The accuracy of the proposed HARC method was 82.50 percent IMDB, 98.00 percent for toxic data, 92.31 percent for Cornflower, and 94.60 percent for Emotion recognition data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancing secure QR code steganography through artificial intelligence: a conceptual framework by Roslan, Nuur Alifah, Lydia, Maya Silvi, Gutub, Adnan

    Published 2025
    “…This study presents a method for achieving product authentication through data concealing. …”
    Get full text
    Get full text
    Get full text
    Article