Search Results - (( model validation tool algorithm ) OR ( user identification using algorithmic ))
Search alternatives:
- identification using »
- user identification »
- validation tool »
- tool algorithm »
- algorithmic »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
Get full text
Get full text
Thesis -
2
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
3
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
4
Modeling and optimization of multi-holes drilling path using Particle Swarm Optimization
Published 2018“…Then a machining experiment has been conducted to validate the optimization results. The optimization results clearly indicated that the PSO algorithm outperformed all comparison algorithms for the drilling tool path problem. …”
Get full text
Get full text
Research Report -
5
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…The research methodology involves problem modeling, algorithm development, and validation. The TSP concept formulated the MDMT problem, representing holes as cities and tools as a salesman in finding the shortest path to develop a mathematical model or fitness function. …”
Get full text
Get full text
Thesis -
6
Optimization of multi-holes drilling path using particle swarm optimization
Published 2022“…One way to improve the multi-hole drilling is by optimising the tool path in the process. This research aims to model and optimise multi-hole drilling problems using Particle Swarm Optimisation (PSO) algorithm. …”
Get full text
Get full text
Thesis -
7
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
10
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
11
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
12
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
13
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The experimental data used for simulation model correlation and validation. New controller algorithm (SALC) was than developed in Matlab/Simulink and integrate with correlated vehicle plant model for handling performance validation against passive suspension and Skyhook. …”
Get full text
Get full text
Article -
14
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
15
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
Get full text
Get full text
Thesis -
16
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis -
17
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
18
Online fingerprint recognition
Published 2010“…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project
