Search Results - (( user identification using algorithm ) OR ( using function based algorithm ))
Search alternatives:
- identification using »
- user identification »
- using algorithm »
- using function »
-
1
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
2
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
4
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
Get full text
Get full text
Thesis -
5
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
6
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
7
The identification of alcohol percentage limit in halal food using fuzzy logic
Published 2021“…This algorithm and basic framework will be the first step in developing a user-friendly tool that will later benefit the consumer as well as function as an auditor especially in order to control the alcohol content in halal food and beverages.…”
Get full text
Get full text
Get full text
Book Chapter -
8
A hybrid cryptosystem for biometric authentication and template protection
Published 2017“…The proposed key binding scheme known as modified shielding function minimizes the complexity of image processing and addresses the security as well as privacy limitations of generic shielding function. …”
Get full text
Get full text
Thesis -
9
Context aware app recommendation using email semantic analysis
Published 2019“…Email is a kind of electronic tool that people used to exchange message. There are many functionalities such as spam filt ering, categories section, malicious email identification and etc are available in the email application that had been launched in the existing market. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Stress mental health symptom assessment mobile application for young adults
Published 2023“…One of the primary functionalities of the application is to incorporate a machine learning algorithm which is K-Nearest Neighbor (KNN) classification technique for panic attack prediction feature to enhance the emotional identification and offering users an artificial intelligence (AI) chatbot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
13
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
Get full text
Get full text
Article -
14
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
15
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
16
Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection
“…Here, the identification of liquid slosh using the Hammerstein model based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Research Report -
17
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
Get full text
Get full text
Thesis -
18
-
19
Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle
Published 2018“…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
Get full text
Get full text
Thesis -
20
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item
