Search Results - (( model validating a algorithm ) OR ( user identification ((rsa algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…In this paper, major properties of an adaptive fuzzy model as a system identifier when trained by the back-propagation algorithm are discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    RSA authentication mechanisms in control grid computing environment using Gridsim toolkit by Ismail, Saiful Adli, Ngadi, Md Asri, Mohd Sharif, Johan, Kama, Mohd Nazri, Sarkan, Haslina

    Published 2015
    “…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Crptocurrency is a type of digital currency that using decentralized method for validating transaction. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Spotted hyena optimizer with deep learning driven cybersecurity for social networks by Mustafa Hilal, Anwer, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, A. Alharbi, Lubna, K. Nour, Mohamed, Mohamed, Abdullah, S. Almasoud, Ahmed, Motwakel, Abdelwahed

    Published 2023
    “…The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Digital video broadcasting satellite-based passive forward scatter radar for drone detection based on micro Doppler analysis by Musa, Surajo Alhaji

    Published 2019
    “…A theoretical model was designed, simulated, and validated experimentally, for both the Doppler due to drone linear motion and the micro-Doppler signature in FSR geometry. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Analysis of Online Social Network Connections for Identification of Influential Users by Al-Garadi, Mohammed Ali, Varathan, Kasturi Dewi, Ravana, Sri Devi, Ahmed, Ejaz, Mujtaba, Ghulam, Khan, Muhammad Usman Shahid, Khan, Samee U.

    Published 2018
    “…This article presents a detailed survey of influential usersidentification algorithms and their performance evaluation approaches in OSNs. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of person identification application for video surveillance by Soon, Phaik Ching

    Published 2022
    “…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article
  18. 18

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis