Search Results - (( model evaluation from algorithm ) OR ( user identification _ algorithm ))
Search alternatives:
- user identification »
- model evaluation »
- evaluation from »
- from algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
2
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
3
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
4
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
Get full text
Get full text
Get full text
Thesis -
5
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…Experimental method was used by employing five social network datasets including Epinions, Wiki-Vote, SlashDot, Facebook and Twitter from Stanford data repository. Evaluation on IDTU was performed against 3 greedy and 6 heuristics benchmark algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
7
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
8
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…The objective of this study is to develop the mathematical model evaluate growth of Bitcoin exchange rate. The data selected in this study are starting from 1st January 2017 until 10th December 2017. …”
Get full text
Get full text
Get full text
Article -
9
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. …”
Get full text
Get full text
Thesis -
10
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…This approach is proposed based on an adaptation from a part of relevance feedback concept. To realise this approach, the semantic image retrieval prototype is developed based on the existing foundation algorithm and customised to provide the ability for user engagement in order to enhance the retrieval performance. …”
Get full text
Get full text
Thesis -
11
Neuro-modelling and fuzzy logic control of a two-wheeled wheelchair system
Published 2024“…This research addresses these challenges by developing a dynamic non-linear model and stability control using computational algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
13
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
14
-
15
-
16
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…Motivated by these findings, this research proposes a process model for feature extractions from natural language requirements for reuse (FENL). …”
Get full text
Get full text
Thesis -
17
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
20
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article
