Search Results - (( data verification method algorithm ) OR ( data application use algorithm ))
Search alternatives:
- verification method »
- data verification »
- method algorithm »
- data application »
- application use »
- use algorithm »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
2
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
3
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
5
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…Hence, in this research has been proposed a hybrid structure of Dynamic AES (DAES) and Blowfish algorithms. This procedure specifies the security of uploaded file on the cloud with a strong encryption method and also the privacy and reliability of submitted information of a user with considering performance of speed.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
7
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
8
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…Fused image can provide more information than single input image that improve quality and applicability of data. In this work, image fusion algorithms based on Discrete Cosine Transform (DCT) in palm vein recognition is proposed. …”
Get full text
Get full text
Thesis -
9
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. Next, two features are fused by using match score level fusion based on Weighted Sum-Rule. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…The predictive model includes 16 prediction processes with 20 back-propagation algorithms whereby radar imageries and meteorological station data were used as a raw data input. …”
Get full text
Get full text
Thesis -
11
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
12
-
13
-
14
-
15
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…Graphical User Interface (GUI) has been generated to help apply the ANN model results while an applicable equation can be used for Group Method of Data Handling model. …”
Get full text
Get full text
Thesis -
16
Simulation of single and dual layered rapid pressure swing adsorption
Published 2013“…A dual layered RPSA model is then developed. Verification of the applied numerical methods and computer programs are carried out successfully that the simulated results agree well with the analytical solutions and experimental data. …”
Get full text
Get full text
Thesis -
17
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…As illustration, applications are displayed using wind and wave circular data sets.…”
Get full text
Get full text
Thesis -
18
Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac
Published 2024“…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
Get full text
Get full text
Thesis -
19
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
20
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…This study implies that LSR method produced images that are stable and accurate as well as applicable for industrial use. …”
Get full text
Get full text
Get full text
Article
