Search Results - (( user identification using algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
    Get full text
    Get full text
    Thesis
  7. 7

    The identification of alcohol percentage limit in halal food using fuzzy logic by Mohd Ali, Jarinah, Othman, Suhaili, Ahmad Fadzillah, Nurrulhidayah, Abd. Rahman, Norliza

    Published 2021
    “…This algorithm and basic framework will be the first step in developing a user-friendly tool that will later benefit the consumer as well as function as an auditor especially in order to control the alcohol content in halal food and beverages.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    A hybrid cryptosystem for biometric authentication and template protection by Jegede, Abayomi Joshua

    Published 2017
    “…The proposed key binding scheme known as modified shielding function minimizes the complexity of image processing and addresses the security as well as privacy limitations of generic shielding function. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…Email is a kind of electronic tool that people used to exchange message. There are many functionalities such as spam filt ering, categories section, malicious email identification and etc are available in the email application that had been launched in the existing market. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…One of the primary functionalities of the application is to incorporate a machine learning algorithm which is K-Nearest Neighbor (KNN) classification technique for panic attack prediction feature to enhance the emotional identification and offering users an artificial intelligence (AI) chatbot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  14. 14

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item