Search Results - (( data evaluation method algorithm ) OR ( data verification using algorithm ))*

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Get full text
    Get full text
    Article
  5. 5

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A comparative evaluation on data transformation approach for artificial speech detection by Choon Beng Tan, Mohd Hanafi Ahmad Hijazi

    Published 2024
    “…The rise of voice biometrics has transformed user authentication and offered enhanced security and convenience while phasing out less secure methods. Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  7. 7
  8. 8
  9. 9

    Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac by Azlan, Adriana Batrisyia Noor Mohd

    Published 2024
    “…Accurate dose calculation in heterogeneous tissues necessitates comprehensive commissioning and verification due to its impact on patient outcomes. This study evaluates the dose calculation accuracy of Monaco TPS using Rando phantoms, thermoluminescence dosimeters (TLD-100) dosimeters, EBT3 Gafchromic films, and clinical patient data through patient-specific quality assurance (PSQA). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…Furthermore, the proposed scheme's performance and complexity are evaluated using the JPBC cryptographic library. The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…In this project, a neural network is trained to store the passwords and replace verification table. This method is useful in solving security problems that happened in some authentication system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel by Musa, Afiqah

    Published 2018
    “…Second, to develop corresponding data acquisition and noise removal algorithm for extraction of local temperature-time profiles. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Precision and recall are used as the criteria to quantitatively evaluate and validate overall MOD performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method by Tehrany, Mahyat Shafapour, Pradhan, Biswajeet, Jebur, Mustafa Neamah

    Published 2015
    “…In order to examine the efficiency of the proposed ensemble method and to show the proficiency of SVM, another machine learning algorithm such as decision tree (DT) was applied and the results were compared. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The verification of both experiments is made with current state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-stage feature selection in identifying potential biomarkers for cancer classification by Wong, Yit Khee, Chan, Weng Howe, Nies, Hui Wen, Moorthy, Kohbalan

    Published 2022
    “…Many algorithms have been applied and introduced in this area, yet the challenge of high dimensionality of gene expression data remains and it could lead to the existence of noise that could negatively impact the analysis outcome. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…We perform a rigorous evaluation of the proposed method by testing using Floodlight and Mininet to emulate SDN setting. …”
    Get full text
    Get full text
    Thesis