Search Results - (( data verification method algorithm ) OR ( based interactive method algorithm ))
Search alternatives:
- verification method »
- interactive method »
- data verification »
- method algorithm »
-
1
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…This study proposes a novel motion planning method for six-degree-of-freedom industrial robots based on DT technology. …”
Get full text
Get full text
Thesis -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
3
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
Get full text
Get full text
Thesis -
5
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
7
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
8
The development of deformable bodies collision response algorithm for interactive virtual environment
Published 2006“…Physical based deformation method usually suffers from high computation cost which does not favors practical interactive applications, even if the deformation only occurs in a small area of the deformable object. …”
Get full text
Get full text
Monograph -
9
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
Get full text
Get full text
Article -
10
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…In this paper, we propose a new method based on prime number and its characteristics mainly for interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
11
A novel architecture to verify offline hand-written signatures using convolutional neural network
Published 2023Conference Paper -
12
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
13
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Prime-based method for interactive mining of frequent patterns
Published 2010“…As response to the above-mentioned challenges, this study is devoted towards developing an interactive mining method based on prime number and its special characteristic “uniqueness” by which the content of the relevant data is transformed into a compact layout. …”
Get full text
Get full text
Thesis -
15
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
-
18
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
19
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The proposed method achieves a promising result in the person recognition system.…”
Get full text
Get full text
Get full text
Get full text
Article -
20
An experimental study of modified black hole algorithms
Published 2018“…Ultimately, seven variants of BH algorithms are established based on the white hole, local search, and gravitational interaction. …”
Get full text
Get full text
Get full text
Thesis
