Search Results - (( data distribution methods algorithm ) OR ( data verification method algorithm ))*

Refine Results
  1. 1

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…We first look at the concentration parameter of von Mises distribution. The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test by Beddelee, A.A.A.M., Mohamad, H., Tee, B.P.

    Published 2023
    “…Experts are reconciling with different data processing algorithms to assess pile capacity (t-z curve) from the DOFS data and verify it, leading to a demand for standard practice. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac by Azlan, Adriana Batrisyia Noor Mohd

    Published 2024
    “…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An impulsive noise analyser using amplitude probability distribution (APD) for broadband-wired communication by Zainal Abidin, Ahmadun Nijar

    Published 2011
    “…It is vital to have correct measurement set-up, signal power level, sampling rate, sample points and filter characterisation in order to acquire accurate data representation of the noise patterns. The APD graph is generated by the analyser using the APD algorithm method which employs the envelope sampling technique from actual probability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…The verification of the proposed approach is made with current state-of-the-art algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The formal security verification of the proposed scheme is validated with the AVISPA tool, a powerful validation method for network security applications. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model by Huang, Yuk Feng

    Published 2000
    “…Maximum infiltration, overland flow discharge, and overland with channel flow discharge were observed for model verification. Finite element simulations have been shown to compare favourably with observed laboratory data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mechanical and grain growth behaviour of wire-arc additive manufacturing (WAAM) of SS316L using experiment and numerical simulation / Muhd Faiz Mat @ Muhammad by Mat @ Muhammad, Muhd Faiz

    Published 2022
    “…Included in this phase is the complex experimental thermal history data acquired by using a high-temperature thermocouple connected to a Data Acquisition System (DAQ) for thermal calibration. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimal search algorithm in a big database using interpolation–extrapolation method by Kabir, M. Nomani, Alginahi, Yasser M., Ali, J., Abdel-Raheem, E.

    Published 2019
    “…Search using traditional binary-search algorithm can be accelerated by employing an interpolation search technique when the data is regularly distributed. …”
    Get full text
    Get full text
    Get full text
    Article