Search Results - (( model evaluation system algorithm ) OR ( user identification matching algorithm ))*

Refine Results
  1. 1

    Face detection of thermal images based on color image processing by Nur Farahana , Mat Khairi

    Published 2012
    “…Finally, all the different steps are merged into an integrated system for full face detection. The system is evaluated based on accuracy and performance.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…For minutiae matching, the matching algorithm has been developed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION by ALEX, NG HO LIAN

    Published 2020
    “…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…A user provides the agent with keywords and assigns a threshold value for each given keyword, the agent in turn attempts to find papers that match the keywords within a defined threshold. …”
    Article
  10. 10
  11. 11
  12. 12

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
    Article
  13. 13
  14. 14

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…The objective of this project is accomplished in the creation of a reliable, scalable and user-friendly system for facial recognition attendance.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…The objectives include studying the requirements of the decision tree in the diagnosis and recommendation system, developing a prototype for the system, and evaluating the accuracy of the decision tree algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Model predictive control for MPPT of distributed photovoltaic module by Jowalin, Wellfred

    Published 2017
    “…A couple of troubleshooting process was done to match the desired output. A slightly inaccurate result for MPC technique due to the plant develops in system identification.…”
    Get full text
    Get full text
    Student Project
  17. 17

    Assignation of PSM evaluator using genetic algorithm by Yap, Suet Lee

    Published 2012
    “…The purpose of this paper is to present a design of development for Assignation of PSM Evaluator using Genetic Algorithm(APEGA)system.This is an application system that is used to assist the Faculty of Computer System and Software Engineering(FSKKP)of University Malaysia Pahang(UMP)in matching the optimum evaluators for the students in PSM presentation carnival.In the methodology part,a development model which involves with client participation is designed in order to use in the development of this project.The target user of the system is PSM coordinator who is responsible in assigning the PSM evaluator.Assignation of PSM Evaluator using Genetic Algorithm APEGA)is expected to be able in developing a well-distributed matching and overcoming the relevant constraints in an intelligent way. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Speaker recognition using neural network by Zul Rasyied, Ab. Rasat

    Published 2012
    “…Speaker recognizer may be employed as part of a security system requiring user authentication. Mostly, years by years there have been several techniques being developed to achieve high success rate of accuracy in the identification and verification of individuals for authentication in security systems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20