Search Results - (( data evaluation method algorithm ) OR ( data verification method algorithm ))

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Get full text
    Get full text
    Article
  5. 5

    A comparative evaluation on data transformation approach for artificial speech detection by Choon Beng Tan, Mohd Hanafi Ahmad Hijazi

    Published 2024
    “…The rise of voice biometrics has transformed user authentication and offered enhanced security and convenience while phasing out less secure methods. Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  6. 6

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market by Pourdaryaei, Alireza, Mokhlis, Hazlie, Illias, Hazlee Azil, Kaboli, S. Hr. Aghay, Ahmad, Shameem, Ang, Swee Peng

    Published 2019
    “…Therefore, this research proposes a hybrid method for electricity price forecasting via artificial neural network (ANN) and artificial cooperative search algorithm (ACS). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac by Azlan, Adriana Batrisyia Noor Mohd

    Published 2024
    “…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  12. 12

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel by Musa, Afiqah

    Published 2018
    “…Second, to develop corresponding data acquisition and noise removal algorithm for extraction of local temperature-time profiles. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method by Tehrany, Mahyat Shafapour, Pradhan, Biswajeet, Jebur, Mustafa Neamah

    Published 2015
    “…In order to examine the efficiency of the proposed ensemble method and to show the proficiency of SVM, another machine learning algorithm such as decision tree (DT) was applied and the results were compared. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…Smart home networks consist of a wide range of wired or wireless devices, there is possibility that illegal access to some restricted data or devices may happen. Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In conclusion, the multiple moving object detection technique proposed in this study is robust to unknown transformations, with significant improvements in overall precision and recall compared to existing methods. The proposed algorithm is designed in order to tackle many limitations of the existing algorithms such as handle inevitable occlusions, model different motions from multiple moving objects, and consider the spatial information.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-stage feature selection in identifying potential biomarkers for cancer classification by Wong, Yit Khee, Chan, Weng Howe, Nies, Hui Wen, Moorthy, Kohbalan

    Published 2022
    “…Many algorithms have been applied and introduced in this area, yet the challenge of high dimensionality of gene expression data remains and it could lead to the existence of noise that could negatively impact the analysis outcome. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The verification of both experiments is made with current state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis