Search Results - (( data verification means algorithm ) OR ( parallel evaluation means algorithm ))*

Refine Results
  1. 1

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…The goodness of fit validation based on the normalized root-mean-square error (NRMSE) and normalized mean square error, and Theil’s inequality coefficient are used to evaluate the performance of models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The proposed algorithms were evaluated to test their speed in handling streaming data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks by Said, Mohamed Abdisalan

    Published 2015
    “…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…Least significant bits (LSB) were used by the techniques to encrypt authentication data. By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  10. 10

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. In this project, a neural network is trained to store the passwords and replace verification table. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok by Bachok, Mohd Fatruz

    Published 2019
    “…The predictive model includes 16 prediction processes with 20 back-propagation algorithms whereby radar imageries and meteorological station data were used as a raw data input. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS by AYOUB MOHAMMED, MOHAMMED ABDALLA

    Published 2011
    “…It was found that (by the Group Method of Data Handling algorithm), length of the pipe, wellhead pressure, and angle of inclination have a pronounced effect on the pressure drop estimation under these conditions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. In this research, data is collected from reputed stock markets; New York Stock Exchange (NYSE), NASDAQ and emerging markets; Dhaka Stock Exchange (DSE), Bursa Malaysia. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…A total of 206 negative lightning return strokes waveforms were analysed and automatically characterised using the proposed algorithm. Comparisons of different data, including the manual data (i.e. obtained through the conventional method), data (automated) from a previous study, and the automated data (i.e. obtained using the proposed algorithm), were also carried out by evaluating the percentage difference, arithmetic mean, and standard deviation. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…For the Data Part, 200 sets of UserID and Passwords were created and encoded into binary as the input. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak by Saqib Iqbal , Hakak

    Published 2018
    “…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems by Annisa, Jamali, Muhammad Sukri, Hadi, Hanim, Mohd Yatim, Mat Hussin, Ab Talib, Intan Zaurah, Mat Darus

    Published 2019
    “…Initially, the experimental rig was designed and integrated with the instrumentation system for vibration data collection purpose. The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding