Search Results - (( based application method algorithm ) OR ( data verification method algorithm ))
Search alternatives:
- verification method »
- based application »
- data verification »
- method algorithm »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
2
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
Get full text
Get full text
Thesis -
3
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
4
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
5
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
6
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
7
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…Fused image can provide more information than single input image that improve quality and applicability of data. In this work, image fusion algorithms based on Discrete Cosine Transform (DCT) in palm vein recognition is proposed. …”
Get full text
Get full text
Thesis -
8
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
11
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. We develop the clustering-based procedure for the predicted and residual values obtained from the Down and Mardia model fit of a circular-circular data set. …”
Get full text
Get full text
Thesis -
12
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
Get full text
Get full text
Get full text
Article -
13
-
14
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…This study proposes a novel motion planning method for six-degree-of-freedom industrial robots based on DT technology. …”
Get full text
Get full text
Thesis -
15
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Methods/Analysis:The proposed framework is divided into four layers with each performing authentication, verification and integrity at different levels of communication between entities. …”
Get full text
Get full text
Get full text
Article -
18
Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test
Published 2023“…Experts are reconciling with different data processing algorithms to assess pile capacity (t-z curve) from the DOFS data and verify it, leading to a demand for standard practice. …”
Get full text
Get full text
Conference or Workshop Item -
19
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The verification of the proposed approach is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Thesis
