Search Results - (( data collection method algorithm ) OR ( data verification method algorithm ))
Search alternatives:
- verification method »
- collection method »
- data verification »
- method algorithm »
-
1
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
2
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…Image fusion is a method to collect necessary information from all input image with different sources and create an output image that ideally has information from input image. …”
Get full text
Get full text
Thesis -
3
ECG biometric verification incorporating different physiological conditions
Published 2025“…Thus, to improve the current research, this work proposed a robust biometric identification by introducing ECG signals incorporating various physiological conditions. After the data collection of cycling, walking, climbing stairs, and jogging, the signals are pre-processed by using MODWT to remove unwanted noises produced during data collection process. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market
Published 2019“…Therefore, this research proposes a hybrid method for electricity price forecasting via artificial neural network (ANN) and artificial cooperative search algorithm (ACS). …”
Get full text
Get full text
Article -
5
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…It was found that (by the Group Method of Data Handling algorithm), length of the pipe, wellhead pressure, and angle of inclination have a pronounced effect on the pressure drop estimation under these conditions. …”
Get full text
Get full text
Thesis -
6
Development And Verification Of Traffic Noise Estimation Using Quarry Environmental Modeling (Qem)
Published 2017“…The data collected was analyzed using IBM SPSS 13.0 software package. …”
Get full text
Get full text
Monograph -
7
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
8
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…The modeling of a buck converted-powered DC motor system is first provided to form the basis of data collection and fictitious reference signal derivation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method
Published 2015“…Remote sensing and geographic information system techniques can support overall flood management as they can produce rapid data collection and analysis for hydrological studies. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
12
Assessment of topographic mapping by using digital camera, digital consumer grade camera and Aster 30 in term of accuracy and quality in kampung Asam Kubang, Taiping, perak / Abdul...
Published 2018“…For the VP (Verification Points), there is 30 points in total that is observed with Topcon GR5 by using the RTK (Real Time Kinematics) method. …”
Get full text
Get full text
Thesis -
13
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
16
A novel architecture to verify offline hand-written signatures using convolutional neural network
Published 2023Conference Paper -
17
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
18
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
20
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis
