Search Results - (( new evaluation _ algorithm ) OR ( user identification using algorithm ))*
Search alternatives:
- identification using »
- user identification »
- using algorithm »
- new evaluation »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
2
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The second taxonomy is a new taxonomy proposed to classify the adaptive DE algorithms in particular into two categories (DE with adaptive parameters and DE with adaptive parameters and strategies) considering the adaptive components used in this algorithm. …”
Get full text
Get full text
Thesis -
3
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…This is because CNN can automatically extract new image data from written material. The CNN model is trained and evaluated on a wide range of handwritten sample datasets. …”
Get full text
Get full text
Thesis -
4
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…ERP ALAR was implemented in Matlab R2009a using Genetic Algorithm (GA) with multi-objectives. …”
Get full text
Get full text
Thesis -
6
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Get full text
Article -
7
A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System
Published 2016“…The image preprocessing steps were implemented in MATLAB, while the CNN algorithm was implemented in C language (using GCC compiler). …”
Get full text
Get full text
Get full text
Article -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
9
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
10
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…The developed algorithm needs no human intervention until the final result is displayed to the user, if the user is not satisfied with the segmentation results he/ she can appoint new seeds interactively to fine tune the segmentation. …”
Get full text
Get full text
Thesis -
11
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
12
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
15
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
16
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
17
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
18
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis -
19
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article
