Search Results - (( user evaluation based algorithm ) OR ( user identification system algorithm ))*

Refine Results
  1. 1

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Influence maximisation towards target users and minimal diffusion of information based on information needs by Temitope, Olanrewaju Abdus-Samad

    Published 2020
    “…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System by Syazana Itqan, Khalid, Syafeeza, Ahmad Radzi, Norhashimah, Mohd Saad

    Published 2016
    “…This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  11. 11

    Hardware And Software Development Of ECG Biometric System by Chia, Pei Kiak

    Published 2018
    “…In this project, Pan-Tompkins algorithm is used as feature extraction technique of ECG fiducial points while artificial neural network is used for identification system. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee by Wan Roshdee, Wan Nur Alya Athirah

    Published 2024
    “…The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman by Sulaiman, Mohd Suffian

    Published 2020
    “…To realise this approach, the semantic image retrieval prototype is developed based on the existing foundation algorithm and customised to provide the ability for user engagement in order to enhance the retrieval performance. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Face detection of thermal images based on color image processing by Nur Farahana , Mat Khairi

    Published 2012
    “…Finally, all the different steps are merged into an integrated system for full face detection. The system is evaluated based on accuracy and performance.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
    Get full text
    Get full text
    Get full text
    Thesis