Search Results - (( using optimization using algorithm ) OR ( user identification using algorithm ))

Refine Results
  1. 1

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…It was observed that, by using the Decision Tree and Random Forest algorithm 100% accuracy was achieved, when the smartphone was placed at the thigh during stair movement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…Our results from the conducted experiments revealed that the proposed algorithm outperform the state-of-the-art aspect extraction algorithms and optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Deep Learning Based Face Attributes Recognition by Saidi, Mohamad Hazim

    Published 2018
    “…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…ERP ALAR was implemented in Matlab R2009a using Genetic Algorithm (GA) with multi-objectives. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Systematic design of chemical reactors with multiple stages via multi-objective optimization approach by Mohd Fuad, Mohd Nazri, Hussain, Mohd Azlan

    Published 2015
    “…This approach is investigated for two industrially important reactor systems: ethylene oxide and phthalic anhydride synthesis. By using reference-point based multi-objective evolutionary algorithm (R-NSGA-II), Pareto-optimal solutions are successfully generated within the region of user-specified reference points, thus facilitating in the selection of final optimal designs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee by Wan Roshdee, Wan Nur Alya Athirah

    Published 2024
    “…It also has been explained about the use of Convolutional Neural Network (CNN) in the project, the advantages and disadvantages, the implementation of the algorithm in various problem and similar works with the project title. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Non-Intrusive Electrical Load Monitoring and Identification: Approaches, Tools and a Case Study by Elixie A.E., Alkahtani A.A., Alkawsi G., Salle S.F., Fazea Y., Ekanayake J.

    Published 2023
    “…The present paper investigates current work in progress for optimizing energy use with IoT devices to provide sufficient feedback for users. …”
    Article
  11. 11
  12. 12

    Neuro-modelling and fuzzy logic control of a two-wheeled wheelchair system by Nizaruddin, M. Nasir, Nor Maniha, Abdul Ghani, Ahmad Nor Kasruddin, Nasir, Mohd Ashraf, Ahmad, Tokhi, M. Osman

    Published 2024
    “…Ensuring stable and responsive control, design of optimized PD-type and PID-type fuzzy logic controllers using Particle Swarm Optimization (PSO) were established and were tested under a simulation environment. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article