Search Results - (( data verification means algorithm ) OR ( parallel evaluation means algorithm ))*
Search alternatives:
- verification means »
- data verification »
- evaluation means »
- means algorithm »
-
1
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
Get full text
Get full text
Thesis -
2
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…The goodness of fit validation based on the normalized root-mean-square error (NRMSE) and normalized mean square error, and Theil’s inequality coefficient are used to evaluate the performance of models. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The proposed algorithms were evaluated to test their speed in handling streaming data. …”
Get full text
Get full text
Thesis -
4
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
5
-
6
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
Published 2015“…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Least significant bits (LSB) were used by the techniques to encrypt authentication data. By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
Get full text
Get full text
Thesis -
8
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
Get full text
Get full text
Thesis -
10
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. In this project, a neural network is trained to store the passwords and replace verification table. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…The predictive model includes 16 prediction processes with 20 back-propagation algorithms whereby radar imageries and meteorological station data were used as a raw data input. …”
Get full text
Get full text
Thesis -
12
Extreme Learning Machines: A new approach for prediction of reference evapotranspiration
Published 2023Article -
13
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…It was found that (by the Group Method of Data Handling algorithm), length of the pipe, wellhead pressure, and angle of inclination have a pronounced effect on the pressure drop estimation under these conditions. …”
Get full text
Get full text
Thesis -
14
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. In this research, data is collected from reputed stock markets; New York Stock Exchange (NYSE), NASDAQ and emerging markets; Dhaka Stock Exchange (DSE), Bursa Malaysia. …”
Get full text
Get full text
Thesis -
15
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…A total of 206 negative lightning return strokes waveforms were analysed and automatically characterised using the proposed algorithm. Comparisons of different data, including the manual data (i.e. obtained through the conventional method), data (automated) from a previous study, and the automated data (i.e. obtained using the proposed algorithm), were also carried out by evaluating the percentage difference, arithmetic mean, and standard deviation. …”
Get full text
Get full text
Thesis -
16
-
17
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…For the Data Part, 200 sets of UserID and Passwords were created and encoded into binary as the input. …”
Get full text
Get full text
Get full text
Article -
18
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…For sentiment detection, the AOADL-TC technique applies a parallel bidirectional gated recurrent unit (BiGRU) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
Get full text
Get full text
Get full text
Thesis -
20
Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems
Published 2019“…Initially, the experimental rig was designed and integrated with the instrumentation system for vibration data collection purpose. The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
Get full text
Get full text
Get full text
Proceeding
