Search Results - (( bubble detection method algorithm ) OR ( model verification analysis algorithm ))*
Search alternatives:
- verification analysis »
- method algorithm »
-
1
-
2
Charge coupled device based on optical tomography system in detecting air bubbles in crystal clear water
Published 2024“…Experiments in detecting moving air bubbles are conducted. The images of captured data are reconstructed based on filtered image of Linear Back Projection with Hybrid algorithms. …”
Article -
3
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…This study enhances invariant recognition of human faces and analysis to improve face verification and identification performance using Active Appearance Model (AAM) for feature extraction with Bayesian classification approach. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…This paper describes the design and development of an offline signature verification system that is based on Hidden Markov Modeling (HMM) technique performed on a series of a localized direction feature extracted from a scanned signature image. …”
Article -
5
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…The development of an android application is done and provided with three calculation method which is an absolute method, relative method and finding suitable geoid model method. There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
Get full text
Get full text
Thesis -
6
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…In this research, our main objective is to generate a new model checking computation method based on Groebner bases algorithm for safety property analysis of distributed discrete controllers. …”
Get full text
Get full text
Get full text
Technical Report -
7
-
8
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…The rough sets vector quantization model proved its usefulness in the speech recognition framework, however it can be extended to different applications that involve large amounts of data such as speaker verification.…”
Get full text
Get full text
Thesis -
9
-
10
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
Get full text
Get full text
Article -
11
Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water
Published 2024“…Experiments in detecting static solid, transparent objects and moving air bubbles are conducted. …”
Article -
12
-
13
Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water
Published 2024journal::journal article -
14
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Development of biosignals-based multimodal biometric system
Published 2014“…Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
Get full text
Get full text
Get full text
Thesis -
16
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location nodes in the targeted and validated models were ranked using the web-based search algorithms according to the respective ranking values. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
18
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
19
Case driven TLC model checker analysis in energy scenario
Published 2023“…To this end, to foster the effectiveness of model checking technique application, with respect to a particular case driven scenario, the analysis of broadly applied TLC model checker has been conducted on the basis of a role model from energy domain. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Effects of integration on the cost reduction in distribution network design for perishable products
Published 2014“…To solve the integrated model, a memetic algorithm (MA) is developed in this study. …”
Get full text
Get full text
Get full text
Article
