Search Results - (( motion evaluation tool algorithm ) OR ( user identification tree algorithm ))

Refine Results
  1. 1
  2. 2

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…There are a few outcomes that have been achieved to decide between those two machine learning methods that have better accuracy to carry out analysis on the dataset which of the two, but rather Decision Tree, have the greater accuracy. Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Mohd Sobran, Nur Maisarah, Bahar, Mohd Bazli, Oh, Kok Ken, Mat Ibrahim, Masrullizam, Johan, Nurul Fatiha

    Published 2016
    “…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Rapid lard identification with portable electronic nose by Latief, Marsad, Khorsidtalab, Aida, Saputra, Irwan, Akmeliawati, Rini, Nordin, Anis Nurashikin, Jaswir, Irwandi, Witjaksono, Gunawan

    Published 2017
    “…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    IMPACT OF NUMBER OF ATTRIBUTES ON THE ACCURACY OF HUMAN MOTION CLASSIFICATION by Chan, Choon K, Girma, T. Chala*

    Published 2018
    “…The impact of the number of attributes on classification accuracy is evaluated via Bayes, Function, Lazy, Meta, Rule and Trees classifier algorithms supported by the WEKA tool. …”
    Get full text
    Get full text
    Article
  9. 9

    Rapid lard identification with portable electronic nose by Latief, M., Khorsidtalab, A., Saputra, I., Akmeliawati, R., Nurashikin, A., Jaswir, I., Witjaksono, G.

    Published 2017
    “…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Data-driven fractional-order PID controller tuning for liquid slosh suppression using marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali, Shahrizal, Saat

    Published 2023
    “…The proposed data-driven tuning tool demonstrates superior performance compared to other recent metaheuristic optimization algorithms across the majority of evaluation criteria.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm by Mohd Tumari, Mohd Zaidi Mohd, Mustapha, Nik Mohd Zaitul Akmal, Ahmad, Mohd Ashraf, Saat, Shahrizal, Ghazali, Mohd Riduwan

    Published 2023
    “…We have shown that the proposed data-driven tuning tool has a good ability in producing better results for the majority of the performance criteria as compared to other recent metaheuristic optimization algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A study on model-free approach for liquid slosh suppression based on stochastic approximation by Ahmad, Mohd Ashraf

    “…Here, a Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm is suggested as a promising tool for the model-free control approach. …”
    Get full text
    Get full text
    Research Report
  14. 14

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…The aim of this research is to develop a computer vision-based technique for analysis of hand therapy exercise and to evaluate the propose angle measurement with the conventional measurement tool, which is goniometer. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali, Nik Mohd Zaitul Akmal, Mustapha, Shahrizal, Saat

    Published 2023
    “…We have shown that the proposed data-driven tuning tool has a good ability in producing better results for the majority of the performance criteria as compared to other recent metaheuristic optimization algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development of data-driven controller for slosh suppression in liquid cargo vehicles by Mohd Falfazli, Mat Jusof, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Suid, Mohd Helmi, Saari, Mohd Mawardi

    “…Here, a Safe Experimentation Dynamics (SED) algorithm is suggested as a promising tool for the data-driven control approach. …”
    Get full text
    Get full text
    Research Report
  17. 17

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Gait pattern detection for amputated prosthetic using fuzzy algorithm by Abdullah, Ahmad Faisal

    Published 2015
    “…The data acquired from the motion tests was displayed graphically through GUI MATLAB. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20