Search Results - (( model validation new algorithm ) OR ( user identification ((tree algorithm) OR (_ algorithm)) ))
Search alternatives:
- user identification »
- model validation »
- validation new »
- tree algorithm »
- new algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
Get full text
Get full text
Thesis -
2
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
3
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
4
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
6
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
7
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
8
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
Get full text
Get full text
Thesis -
9
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
Get full text
Get full text
Article -
10
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…(Abdulrahim et al., 2014) proposed a new algorithm, called New Improved Round Robin (NIRR) to enhance the Round Robin scheduling algorithm. …”
Get full text
Get full text
Thesis -
13
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…Reference [1] proposed a new algorithm, called New Improved Round Robin (NIRR) to enhance the Round Robin scheduling algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…This research aimed to establish a computational model that represents the ALB-EE, propose a new Tiki-Taka Algorithm (TTA) to solve and optimize the ALB-EE and validate the developed model through a real-life case study. …”
Get full text
Get full text
Thesis -
17
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
18
-
19
-
20
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The experimental data used for simulation model correlation and validation. New controller algorithm (SALC) was than developed in Matlab/Simulink and integrate with correlated vehicle plant model for handling performance validation against passive suspension and Skyhook. …”
Get full text
Get full text
Article
