Search Results - (( model validation new algorithm ) OR ( user identification based algorithm ))

Refine Results
  1. 1

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…Accordingly, this paper describes a new self-calibration methodology for nonlinear pressure sensors based on an LMBP-ANN model. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…(Abdulrahim et al., 2014) proposed a new algorithm, called New Improved Round Robin (NIRR) to enhance the Round Robin scheduling algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…Reference [1] proposed a new algorithm, called New Improved Round Robin (NIRR) to enhance the Round Robin scheduling algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…This research aimed to establish a computational model that represents the ALB-EE, propose a new Tiki-Taka Algorithm (TTA) to solve and optimize the ALB-EE and validate the developed model through a real-life case study. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
    Article
  19. 19

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…The capacity to reliably estimate a person's age using facial traits is critical in improving user experiences and security processes. In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
    Get full text
    Get full text
    Thesis
  20. 20