Search Results - (( data reduction methods algorithm ) OR ( based verification method algorithm ))
Search alternatives:
- verification method »
- based verification »
- reduction methods »
- methods algorithm »
- method algorithm »
- data reduction »
-
1
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…The experiments were carried out with defining a number of scenarios on ECG data sets designed rely on feature extractors which were modeled based on an autocorrelation in conjunction with linear and nonlinear dimension reduction methods. …”
Get full text
Get full text
Conference or Workshop Item -
2
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…SIFT algorithm achieved a reduction in EER rate by 12% in 700 nm, 8% in 850 nm, 7% in 940 nm compared with the SURF algorithm. …”
Get full text
Get full text
Thesis -
3
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
Get full text
Get full text
Article -
4
Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel
Published 2018“…Second, to develop corresponding data acquisition and noise removal algorithm for extraction of local temperature-time profiles. …”
Get full text
Get full text
Get full text
Thesis -
5
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
6
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
7
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
8
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
Get full text
Get full text
Thesis -
9
-
10
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
11
Face identification and verification using PCA and LDA
Published 2008“…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The reduction method contains two techniques, namely features reduction and data reduction which are commonly applied to a classification problem. …”
Get full text
Get full text
Conference or Workshop Item -
14
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
15
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
16
-
17
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
An Alternative Algorithm for Soft Set Parameter Selection using Special Order
Published 2015“…This paper proposed a parameter reduction algorithm, known as 3C algorithm, to circumvent the false frequent object in reduction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
20
Numerical Integration And Data Reduction For Application In Photometry
Published 2003“…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
Get full text
Get full text
Thesis
