Search Results - (( re evaluation based algorithm ) OR ( user identification based algorithm ))*
Search alternatives:
- identification based »
- user identification »
- evaluation based »
- re evaluation »
-
1
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
Get full text
Get full text
Article -
2
-
3
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
4
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
5
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
6
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
7
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
Get full text
Get full text
Get full text
Thesis -
9
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
10
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article -
11
-
12
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…GDF and GSF controllers are evaluated for two test cases namely “two-part-type production line” and “re-entrant production system”. …”
Get full text
Get full text
Thesis -
14
Segmentation of MRI brain images using statistical approaches
Published 2011“…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
Get full text
Get full text
Thesis -
15
State-Aware re-configuration model for multi-radio wireless Mesh Networks
Published 2017“…The proposed algorithm re-assigns channels to radios and re-configures flows’ routes with aim of achieving a tradeoff between maximizing the network throughput and minimizing the re-configuration overhead. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
17
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…The capacity to reliably estimate a person's age using facial traits is critical in improving user experiences and security processes. In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
Get full text
Get full text
Thesis -
18
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
19
Embedded system for biometric identification based on iris detection
Published 2009Get full text
Article -
20
Sustainable renewable energy resources utilization in rural areas
Published 2016“…A region having ten different sub-regions has been considered for the optimization based on transportation algorithm. The partitions are made based on customer segmentation to ensure that various scattered demand for the RE is represented at the best location to enhance energy optimization by minimizing the energy loss during transmission. …”
Get full text
Get full text
Article
