Search Results - (( based verification method algorithm ) OR ( data extraction method algorithm ))

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multispectral palm vein image fusion for contactless palm vein verification system by Soh, Shi Chuan

    Published 2018
    “…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel by Musa, Afiqah

    Published 2018
    “…Second, to develop corresponding data acquisition and noise removal algorithm for extraction of local temperature-time profiles. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  19. 19

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  20. 20