Search Results - (( data distribution methods algorithm ) OR ( data verification method algorithm ))*
Search alternatives:
- distribution methods »
- verification method »
- data distribution »
- methods algorithm »
- data verification »
- method algorithm »
-
1
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…We first look at the concentration parameter of von Mises distribution. The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
Get full text
Get full text
Thesis -
2
Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test
Published 2023“…Experts are reconciling with different data processing algorithms to assess pile capacity (t-z curve) from the DOFS data and verify it, leading to a demand for standard practice. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac
Published 2024“…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
Get full text
Get full text
Thesis -
4
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
An impulsive noise analyser using amplitude probability distribution (APD) for broadband-wired communication
Published 2011“…It is vital to have correct measurement set-up, signal power level, sampling rate, sample points and filter characterisation in order to acquire accurate data representation of the noise patterns. The APD graph is generated by the analyser using the APD algorithm method which employs the envelope sampling technique from actual probability. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
7
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The verification of the proposed approach is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Thesis -
8
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…The formal security verification of the proposed scheme is validated with the AVISPA tool, a powerful validation method for network security applications. …”
Get full text
Get full text
Get full text
Article -
9
Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model
Published 2000“…Maximum infiltration, overland flow discharge, and overland with channel flow discharge were observed for model verification. Finite element simulations have been shown to compare favourably with observed laboratory data. …”
Get full text
Get full text
Thesis -
10
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
12
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
13
A novel architecture to verify offline hand-written signatures using convolutional neural network
Published 2023Conference Paper -
14
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
15
Mechanical and grain growth behaviour of wire-arc additive manufacturing (WAAM) of SS316L using experiment and numerical simulation / Muhd Faiz Mat @ Muhammad
Published 2022“…Included in this phase is the complex experimental thermal history data acquired by using a high-temperature thermocouple connected to a Data Acquisition System (DAQ) for thermal calibration. …”
Get full text
Get full text
Thesis -
16
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
18
Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour
Published 2022“…Meanwhile, k-NN algorithm is used to classify the experimental data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
Get full text
Get full text
Thesis -
20
Optimal search algorithm in a big database using interpolation–extrapolation method
Published 2019“…Search using traditional binary-search algorithm can be accelerated by employing an interpolation search technique when the data is regularly distributed. …”
Get full text
Get full text
Get full text
Article
