Search Results - (( motion evaluation tool algorithm ) OR ( user identification tree algorithm ))
Search alternatives:
- user identification »
- identification tree »
- motion evaluation »
- evaluation tool »
- tool algorithm »
- tree algorithm »
-
1
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
2
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…There are a few outcomes that have been achieved to decide between those two machine learning methods that have better accuracy to carry out analysis on the dataset which of the two, but rather Decision Tree, have the greater accuracy. Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
3
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
Get full text
Get full text
Thesis -
5
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
6
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
7
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
IMPACT OF NUMBER OF ATTRIBUTES ON THE ACCURACY OF HUMAN MOTION CLASSIFICATION
Published 2018“…The impact of the number of attributes on classification accuracy is evaluated via Bayes, Function, Lazy, Meta, Rule and Trees classifier algorithms supported by the WEKA tool. …”
Get full text
Get full text
Article -
9
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
Get full text
Get full text
Article -
10
Synchronous gravitational search algorithm vs asynchronous gravitational search algorithm: a statistical analysis
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Data-driven fractional-order PID controller tuning for liquid slosh suppression using marine predators algorithm
Published 2023“…The proposed data-driven tuning tool demonstrates superior performance compared to other recent metaheuristic optimization algorithms across the majority of evaluation criteria.…”
Get full text
Get full text
Get full text
Article -
12
Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm
Published 2023“…We have shown that the proposed data-driven tuning tool has a good ability in producing better results for the majority of the performance criteria as compared to other recent metaheuristic optimization algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A study on model-free approach for liquid slosh suppression based on stochastic approximation
“…Here, a Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm is suggested as a promising tool for the model-free control approach. …”
Get full text
Get full text
Research Report -
14
Development of a computer vision-based technique for analysis of hand therapy exercise
Published 2018“…The aim of this research is to develop a computer vision-based technique for analysis of hand therapy exercise and to evaluate the propose angle measurement with the conventional measurement tool, which is goniometer. …”
Get full text
Get full text
Get full text
Thesis -
15
Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm
Published 2023“…We have shown that the proposed data-driven tuning tool has a good ability in producing better results for the majority of the performance criteria as compared to other recent metaheuristic optimization algorithms.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Development of data-driven controller for slosh suppression in liquid cargo vehicles
“…Here, a Safe Experimentation Dynamics (SED) algorithm is suggested as a promising tool for the data-driven control approach. …”
Get full text
Get full text
Research Report -
17
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Gait pattern detection for amputated prosthetic using fuzzy algorithm
Published 2015“…The data acquired from the motion tests was displayed graphically through GUI MATLAB. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article
