Search Results - (( based estimation method algorithm ) OR ( based verification method algorithm ))
Search alternatives:
- verification method »
- based verification »
- estimation method »
- based estimation »
- method algorithm »
-
1
Deep learning-based single-shot and real-time vehicle detection and ego-lane estimation
Published 2020“…In this paper, a DNN based single-shot vehicle detection and ego-lane estimation architecture is presented. …”
Get full text
Get full text
Get full text
Article -
2
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…In this study, we propose an alternative method of constructing a confidence interval based from the distribution of the estimated value of error concentration parameter obtained from the Fisher information matrix. …”
Get full text
Get full text
Thesis -
3
-
4
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…Dynamic characterisations of one-dimensional flexible beam and two-dimensional flexible plate structures are presented and simulation algorithms characterising the behaviour of each structure is developed using finite difference methods. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
7
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
8
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
9
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
10
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
11
-
12
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
13
Face identification and verification using PCA and LDA
Published 2008“…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
16
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
17
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
18
An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems
Published 2019“…The improved algorithm is based on hybridization of quasi opposition-based learning in enhanced scatter search (QOBLESS) method. …”
Get full text
Get full text
Get full text
Article -
19
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed method inherits the robustness properties of the original RFCH estimators. …”
Get full text
Get full text
Thesis -
20
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…To eliminate all of the disadvantages of the classic IC algorithm, we developed a new IC controller based on a fuzzy duty cycle change estimator with direct control. …”
Get full text
Article
