Search Results - (( data estimation using algorithm ) OR ( data verification method algorithm ))

Refine Results
  1. 1

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS by AYOUB MOHAMMED, MOHAMMED ABDALLA

    Published 2011
    “…It was found that (by the Group Method of Data Handling algorithm), length of the pipe, wellhead pressure, and angle of inclination have a pronounced effect on the pressure drop estimation under these conditions. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…As illustration, applications are displayed using wind and wave circular data sets.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…A ‘speeded-up robust features’ algorithm was used to determine the key points of interest and the Euclidean Distance was used to estimate similarity between database images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    An impulsive noise analyser using amplitude probability distribution (APD) for broadband-wired communication by Zainal Abidin, Ahmadun Nijar

    Published 2011
    “…It is vital to have correct measurement set-up, signal power level, sampling rate, sample points and filter characterisation in order to acquire accurate data representation of the noise patterns. The APD graph is generated by the analyser using the APD algorithm method which employs the envelope sampling technique from actual probability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  11. 11

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm by Suparman, S., Rusiman, Mohd Saifullah

    Published 2018
    “…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
    Get full text
    Article
  13. 13

    Semiparametric estimation with profile algorithm for longitudinal binary data by Suliadi, Suliadi, Ibrahim, Noor Akma, Daud, Isa

    Published 2013
    “…We use profile algorithm in the estimation of both parametric and nonparametric components. …”
    Get full text
    Get full text
    Article
  14. 14

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…There have been various procedures suggested to date, whether through manual or automated selections, to choose the best model.This study nonetheless focuses on an automated selection for multiple equations model with the use of iterative estimation method. In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    State estimation of the power system using robust estimator by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2016
    “…The presence of gross errors in the process data for the power system state estimation (PSSE) algorithm is very crucial as they may severely degrade its results. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The performance of the SA algorithm has been explored in terms of accuracies and estimation errors. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item