Search Results - (( user evaluation case algorithm ) OR ( _ identification based algorithm ))
Search alternatives:
- identification based »
- _ identification »
- user evaluation »
- evaluation case »
- case algorithm »
-
1
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
Get full text
Get full text
Thesis -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Evaluation of Instagram's neural machine translation for literary texts: an MQM-Based Analysis
Published 2024“…Subsequently, the Overall Quality Score of the error-based analysis is calculated automatically using the ContentQuo platform. …”
Get full text
Get full text
Get full text
Article -
4
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…The performance of the proposed method was evaluated by a board of three professional radiologists and the final decision was based on the majority agreement. …”
Get full text
Get full text
Thesis -
5
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
6
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…In the second part, two user clustering algorithms are proposed. These algorithms are alternatives to the PF-SUS-SIR and can achieve better throughput-fairness trade-off in case of perfect CSIT and limited feedback. …”
Get full text
Get full text
Thesis -
7
T-way testing : a test case generator based on melody search algorithm
Published 2015“…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
Get full text
Get full text
Get full text
Article -
12
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
13
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
14
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…A hybrid identification algorithm based on Differential Evolution (DE) and PEM is proposed in this study for effective identification of a small scale helicopter's model parameters. …”
Get full text
Get full text
Monograph -
16
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
17
Optimisation of tilt angles for fixed PV Panel via computational algorithm
Published 2022“…At the end, it can be concluded that the top priority to obtain the optimum annual energy generation will be Case 1, by following with Case 3 and Case 2.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
Get full text
Get full text
Get full text
Article -
20
