Search Results - (( model evaluation from algorithm ) OR ( user identification using algorithm ))
Search alternatives:
- identification using »
- user identification »
- model evaluation »
- evaluation from »
- using algorithm »
- from algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
2
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
3
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…This is because CNN can automatically extract new image data from written material. The CNN model is trained and evaluated on a wide range of handwritten sample datasets. …”
Get full text
Get full text
Thesis -
4
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…Moreover, the influencer identification based on specific needs was implemented using a General Additive Model on four fundamental centralities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
7
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
8
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…The objective of this study is to develop the mathematical model evaluate growth of Bitcoin exchange rate. The data selected in this study are starting from 1st January 2017 until 10th December 2017. …”
Get full text
Get full text
Get full text
Article -
9
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. …”
Get full text
Get full text
Thesis -
10
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…This approach is proposed based on an adaptation from a part of relevance feedback concept. To realise this approach, the semantic image retrieval prototype is developed based on the existing foundation algorithm and customised to provide the ability for user engagement in order to enhance the retrieval performance. …”
Get full text
Get full text
Thesis -
11
Neuro-modelling and fuzzy logic control of a two-wheeled wheelchair system
Published 2024“…This research addresses these challenges by developing a dynamic non-linear model and stability control using computational algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
15
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…FENL consists of four main phases: Accessing Requirements, Terms Extraction, Feature Identification and Formation of Feature Model. The proposed model is demonstrated through lab experiment and online software reviews are used as the input. …”
Get full text
Get full text
Thesis -
16
-
17
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
18
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
19
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
20
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
Get full text
Get full text
Get full text
Get full text
Thesis
