Search Results - (( model validation study algorithm ) OR ( user identification new algorithm ))*
Search alternatives:
- user identification »
- identification new »
- new algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
Get full text
Get full text
Thesis -
2
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
3
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
4
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
5
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…Several systems require full identification of a user, as any misclassification may deteriorate the performance of the entire system. …”
Get full text
Get full text
Article -
6
-
7
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…However, the conversion of a complex form of ML algorithms into a simple statistical model is the prime concern. …”
Get full text
Get full text
Thesis -
10
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Unfortunately, password or personal identification number (PIN) verification suffers an inherent problem. …”
Get full text
Get full text
Thesis -
11
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
12
Automated music chord recognition system using Convolutional Neural Network (CNN) / Abdul Qhadir Jailani Azhari
Published 2025“…To overcome these issues, the study uses CNNs to extract features and enhance chord identification performance. The main objectives include analysing existing chord recognition algorithms, creating a prototype for real-time chord identification, and testing its performance with music recordings. …”
Get full text
Get full text
Thesis -
13
Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin
Published 2015“…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
Get full text
Get full text
Thesis -
14
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE is also used to develop a new dynamic parameter identification framework to estimate the barycentric parameters of the CRS A456 robot manipulator. …”
Get full text
Get full text
Thesis -
15
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
16
A language identifier for Indonesian and Malay text document
Published 2016“…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
17
A language identifier for Indonesian and Malay text document
Published 2016“…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
18
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
Get full text
Get full text
Thesis -
19
A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System
Published 2016“…This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. The proposed CNN has the ability to accept new subjects by training the last two layers out of four layers to reduce the neural network training time. …”
Get full text
Get full text
Get full text
Article -
20
Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control
Published 2019“…The performance of modified SFS algorithm to train a nonlinear auto-regressive exogenous model (NARX) structure FNNs-based model of the system was then compared with its predecessor and with several well-known metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Article
