Search Results - (( using function method algorithm ) OR ( user identification using algorithm ))

Refine Results
  1. 1

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…The modified πRKM is able to perform better partition by identifying the overlapping objects between the correct clusters and also capable to do a re-partition using the indiscernibility relation function. Thirdly, the local and global similarity algorithm is proposed to classify the current user pages request to produce recommendations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…The new system outperformed many methods in the literature reported using conventional detection methods. …”
    Get full text
    Get full text
    Article
  4. 4

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In this research, it is to apply the Hilbert-Huang transform (HHT) as a method to analyse the pressure transient signal. The HHT is a way to decompose a signal into intrinsic mode functions (IMF). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Passwords are frequently used to control access to restricted functions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…One of the primary functionalities of the application is to incorporate a machine learning algorithm which is K-Nearest Neighbor (KNN) classification technique for panic attack prediction feature to enhance the emotional identification and offering users an artificial intelligence (AI) chatbot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    “…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article
  12. 12

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…A graphical user interface by using MATLAB language was created based on the best executed method to aid users in counting the trees automatically. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection by Ahmad, Mohd Ashraf, Musa, Zulkifli, Zawawi, Mohd Anwar, Mohd Falfazli, Mat Jusof, Mohd Rashid, Muhammad Ikram, Suid, Mohd Helmi, Zaharuddin, Mohamed

    “…The SCA method is used to tune both coefficients in the nonlinear function and the transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article