Search Results - (( data application using algorithm ) OR ( based verification method algorithm ))
Search alternatives:
- verification method »
- based verification »
- data application »
- method algorithm »
- using algorithm »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
2
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
3
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
4
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
Get full text
Get full text
Conference or Workshop Item -
5
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
6
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…Fused image can provide more information than single input image that improve quality and applicability of data. In this work, image fusion algorithms based on Discrete Cosine Transform (DCT) in palm vein recognition is proposed. …”
Get full text
Get full text
Thesis -
7
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…Next, two features are fused by using match score level fusion based on Weighted Sum-Rule. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
10
-
11
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…As illustration, applications are displayed using wind and wave circular data sets.…”
Get full text
Get full text
Thesis -
12
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Article -
15
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…An algorithm is used to check and analyze the validity and functionality of each layer. …”
Get full text
Get full text
Get full text
Article -
16
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
17
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…This study proposes a novel motion planning method for six-degree-of-freedom industrial robots based on DT technology. …”
Get full text
Get full text
Thesis -
18
Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test
Published 2023“…Experts are reconciling with different data processing algorithms to assess pile capacity (t-z curve) from the DOFS data and verify it, leading to a demand for standard practice. …”
Get full text
Get full text
Conference or Workshop Item -
19
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article
