Search Results - (( model evaluation based algorithm ) OR ( user identification system algorithm ))*
Search alternatives:
- identification system »
- user identification »
- model evaluation »
- evaluation based »
- system algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
2
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
Get full text
Get full text
Student Project -
3
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…Moreover, the influencer identification based on specific needs was implemented using a General Additive Model on four fundamental centralities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
5
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…The aerial image dataset is split into 60% training and 40% testing sets, pre-processed for resolution and pixel normalization. A CNN model is then implemented with Adam optimizer. The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
Get full text
Get full text
Thesis -
6
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
7
Face detection of thermal images based on color image processing
Published 2012“…Finally, all the different steps are merged into an integrated system for full face detection. The system is evaluated based on accuracy and performance.…”
Get full text
Get full text
Undergraduates Project Papers -
8
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. …”
Get full text
Get full text
Thesis -
9
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…To achieve this aim, multi-modality ontology semantic image retrieval model is proposed. Four main components comprising resource identification, information extraction, knowledge-based construction and image retrieval mechanism are the main tasks need to be implemented in this model. …”
Get full text
Get full text
Thesis -
10
Neuro-modelling and fuzzy logic control of a two-wheeled wheelchair system
Published 2024“…A neural network-based Nonlinear Autoregressive model with Exogenous Inputs (NARX) was developed, capturing and behaving similar to the complex dynamics of the wheelchair system with the identification on the experimental input–output data. …”
Get full text
Get full text
Get full text
Article -
11
Zero distortion-based steganography for handwritten signature
Published 2018“…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
Get full text
Get full text
Get full text
Thesis -
12
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. …”
Get full text
Get full text
Conference or Workshop Item -
13
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
14
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
15
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…Fault Detection and Identification (FDI) monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Online fingerprint recognition
Published 2010“…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
Get full text
Get full text
Undergraduates Project Papers -
18
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
19
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article
