Search Results - (( user evaluation model algorithm ) OR ( user identification using algorithm ))*
Search alternatives:
- identification using »
- user identification »
- user evaluation »
- model algorithm »
- using algorithm »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
Get full text
Get full text
Get full text
Thesis -
2
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…It is intended that this initiative would deliver benefits to all of the users and be useful to them.…”
Get full text
Get full text
Student Project -
3
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…This is because CNN can automatically extract new image data from written material. The CNN model is trained and evaluated on a wide range of handwritten sample datasets. …”
Get full text
Get full text
Thesis -
5
-
6
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…The aerial image dataset is split into 60% training and 40% testing sets, pre-processed for resolution and pixel normalization. A CNN model is then implemented with Adam optimizer. The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
Get full text
Get full text
Thesis -
7
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
9
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…To realise this approach, the semantic image retrieval prototype is developed based on the existing foundation algorithm and customised to provide the ability for user engagement in order to enhance the retrieval performance. …”
Get full text
Get full text
Thesis -
10
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. …”
Get full text
Get full text
Thesis -
11
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
12
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
Get full text
Get full text
Get full text
Article -
13
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
14
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…In the same time, the user of the Bitcoin is protected using hash algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Face detection of thermal images based on color image processing
Published 2012“…Therefore, using a faster and less complex algorithm to do the general face detection is a faster way to identify faces. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Neuro-modelling and fuzzy logic control of a two-wheeled wheelchair system
Published 2024“…This research addresses these challenges by developing a dynamic non-linear model and stability control using computational algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
18
-
19
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
20
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…FENL consists of four main phases: Accessing Requirements, Terms Extraction, Feature Identification and Formation of Feature Model. The proposed model is demonstrated through lab experiment and online software reviews are used as the input. …”
Get full text
Get full text
Thesis
