Search Results - (( using function method algorithm ) OR ( user identification system algorithm ))

Refine Results
  1. 1

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…The new system outperformed many methods in the literature reported using conventional detection methods. …”
    Get full text
    Get full text
    Article
  4. 4

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In this research, it is to apply the Hilbert-Huang transform (HHT) as a method to analyse the pressure transient signal. The HHT is a way to decompose a signal into intrinsic mode functions (IMF). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Passwords are frequently used to control access to restricted functions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…To improve the users’ memorability, the upload background picture function and cued colour scheme were proposed for the BPG system; the grid line scaling function and the loose authentication method were proposed for the enhanced BPG system; and the chronological story-based cued recall technique was proposed for the VIP Pro system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  9. 9

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    “…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…The result of the data analysis is visualized into a web application system to enable the analysis results to be interpretable and readable by the user using Plotly visualization tool. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Thus, the systems return irrelevant user search intentions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…A graphical user interface by using MATLAB language was created based on the best executed method to aid users in counting the trees automatically. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection by Ahmad, Mohd Ashraf, Musa, Zulkifli, Zawawi, Mohd Anwar, Mohd Falfazli, Mat Jusof, Mohd Rashid, Muhammad Ikram, Suid, Mohd Helmi, Zaharuddin, Mohamed

    “…The SCA method is used to tune both coefficients in the nonlinear function and the transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…Fault Detection and Identification (FDI) monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article