Search Results - (( data evaluation method algorithm ) OR ( data verification using algorithm ))*
Search alternatives:
- verification using »
- data verification »
- method algorithm »
- data evaluation »
- using algorithm »
-
1
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
2
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
3
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
4
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
Get full text
Get full text
Article -
5
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A comparative evaluation on data transformation approach for artificial speech detection
Published 2024“…The rise of voice biometrics has transformed user authentication and offered enhanced security and convenience while phasing out less secure methods. Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
7
-
8
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
9
Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac
Published 2024“…Accurate dose calculation in heterogeneous tissues necessitates comprehensive commissioning and verification due to its impact on patient outcomes. This study evaluates the dose calculation accuracy of Monaco TPS using Rando phantoms, thermoluminescence dosimeters (TLD-100) dosimeters, EBT3 Gafchromic films, and clinical patient data through patient-specific quality assurance (PSQA). …”
Get full text
Get full text
Thesis -
10
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Furthermore, the proposed scheme's performance and complexity are evaluated using the JPBC cryptographic library. The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. …”
Get full text
Get full text
Thesis -
11
User authentication using neural network in smart home
Published 2009“…In this project, a neural network is trained to store the passwords and replace verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Article -
13
Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel
Published 2018“…Second, to develop corresponding data acquisition and noise removal algorithm for extraction of local temperature-time profiles. …”
Get full text
Get full text
Get full text
Thesis -
14
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Precision and recall are used as the criteria to quantitatively evaluate and validate overall MOD performance. …”
Get full text
Get full text
Get full text
Thesis -
15
Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method
Published 2015“…In order to examine the efficiency of the proposed ensemble method and to show the proficiency of SVM, another machine learning algorithm such as decision tree (DT) was applied and the results were compared. …”
Get full text
Get full text
Get full text
Article -
16
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The verification of both experiments is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
18
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
19
Multi-stage feature selection in identifying potential biomarkers for cancer classification
Published 2022“…Many algorithms have been applied and introduced in this area, yet the challenge of high dimensionality of gene expression data remains and it could lead to the existence of noise that could negatively impact the analysis outcome. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…We perform a rigorous evaluation of the proposed method by testing using Floodlight and Mininet to emulate SDN setting. …”
Get full text
Get full text
Thesis
