Search Results - (( user identification learning algorithm ) OR ( using function method algorithm ))
Search alternatives:
- identification learning »
- user identification »
- learning algorithm »
- method algorithm »
- function method »
- using function »
-
1
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
2
Personal identification by Keystroke Pattern for login security
Published 2001“…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
3
Stress mental health symptom assessment mobile application for young adults
Published 2023“…One of the primary functionalities of the application is to incorporate a machine learning algorithm which is K-Nearest Neighbor (KNN) classification technique for panic attack prediction feature to enhance the emotional identification and offering users an artificial intelligence (AI) chatbot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. …”
Get full text
Get full text
Thesis -
5
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Purpose: A more effective way for searching XML database is to use structured queries. However, using query languages to express queries prove to be difficult for most users since this requires learning a query language and knowledge of the underlying data schema. …”
Get full text
Get full text
Article -
6
-
7
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
8
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
9
Deep Learning Based Face Attributes Recognition
Published 2018“…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
Get full text
Get full text
Monograph -
10
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
12
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…The results show a high 85% accuracy rate in determining the age of individuals. A user-friendly desktop system is created for input of facial photos and receiving immediate age estimation results, illustrating machine learning's assure in age identification. …”
Get full text
Get full text
Thesis -
13
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
14
New hybrid deep learning method to recognize human action from video
Published 2021“…This video content must be examined in order to classify it for different purposes for users. Several machine learning approaches for video classification have been developed to save users time and energy. …”
Get full text
Get full text
Get full text
Article -
15
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
Get full text
Get full text
Undergraduates Project Papers -
16
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Besides reducing the processing overhead it also achieves better results in terms of accuracy compared to the user agent approach. Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis -
17
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Backpropagation learning algorithm has been used as a basis for learning in this study. …”
Get full text
Get full text
Get full text
Thesis -
18
Faulty classification system for VTOL UAV acoustic signal using machine learning
Published 2025“…Users can select their preferred features for faulty prediction using a specified supervised machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Spotted hyena optimizer with deep learning driven cybersecurity for social networks
Published 2023“…Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis
