Search Results - (( motion evaluation model algorithm ) OR ( user identification learning algorithm ))*
Search alternatives:
- identification learning »
- user identification »
- learning algorithm »
- motion evaluation »
- model algorithm »
-
1
Adapting robot kinematics for human-arm motion recognition
Published 2007“…This paper presents a novel method to the analysis of human-arm motion, in particular improving the efficiency of conventional motion recognition algorithms. …”
Get full text
Get full text
Article -
2
The impact of executive function and aerobic exercise recognition in obese children under deep learning
Published 2025“…Initially, a motion recognition model based on STN and Lucas–Kanade optical flow algorithm optimization was constructed. …”
Get full text
Get full text
Article -
3
Multilevel optimization for dense motion estimation
Published 2011“…Experimental results on three image sequences using four models of optical flow with different computational efforts show that the FMG/Opt algorithm outperforms significantly both the TN and MR/Opt algorithms in terms of the computational work and the quality of the optical flow estimation.…”
Get full text
Get full text
Get full text
Monograph -
4
Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali
Published 2025“…The study aims to find out how effective YOLOv8 would be for such hand motions and to train the model with a custom dataset of hand gestures. …”
Get full text
Get full text
Thesis -
5
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Block-matching algorithm is the most common technique applied in block-based motion estimation technique. …”
Get full text
Get full text
Get full text
Book Chapter -
6
A review on particle swarm optimization algorithm and its variants to human motion tracking
Published 2014“…An attempt is made to provide a guide for the researchers working in the field of PSO based human motion tracking from video sequences. Additionally, the paper also presents the performance of various model evaluation search strategies within PSO tracking framework for 3D pose tracking. …”
Get full text
Get full text
Article -
7
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
8
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
9
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
10
Deep Learning Based Face Attributes Recognition
Published 2018“…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
Get full text
Get full text
Monograph -
11
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…The results show a high 85% accuracy rate in determining the age of individuals. A user-friendly desktop system is created for input of facial photos and receiving immediate age estimation results, illustrating machine learning's assure in age identification. …”
Get full text
Get full text
Thesis -
13
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
14
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
15
-
16
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013“…The performance of the algorithm is evaluated using both simulated ARMA models and practical rotary motion system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A Metaheuristic Optimization Using Explosion Method On A Hybrid Pd2-Lqr Quadcopter Controller
Published 2021“…A comparative study with 8 well-known algorithms, PSO, ABC, GA, DE, MVO, MFO, FA, and STOA, was performed to evaluate the performance of the proposed algorithm. …”
Get full text
Get full text
Thesis -
18
PID-based control of a single-link flexible manipulator in vertical motion with genetic optimisation
Published 2009“…This paper presents an investigation into dynamic simulation and controller optimization based on genetic algorithms (GAs) for a single-link flexible manipulator system in vertical plane motion. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
20
An Improved Spiral Dynamic Optimization Algorithm with Engineering Application
Published 2015“…The spiral motion and dynamic step size are generated by a spiral model that produces unique exploration and exploitation strategies of a spiral dynamic algorithm (SDA). …”
Get full text
Get full text
Get full text
Article
