Search Results - (( data verification method algorithm ) OR ( data detection method algorithm ))*
Search alternatives:
- verification method »
- data verification »
- method algorithm »
- data detection »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
2
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
3
A comparative evaluation on data transformation approach for artificial speech detection
Published 2024“…The rise of voice biometrics has transformed user authentication and offered enhanced security and convenience while phasing out less secure methods. Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
Human Spontaneous Emotion Detection System
Published 2018“…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
6
ECG biometric verification incorporating different physiological conditions
Published 2025“…The liveness detection criteria of biological signals have become one of the reasons it has been introduced as an ideal biometric recognition system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
9
Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel
Published 2018“…Further verification done using ultrasonic method also proves the inability of conventional NDT&E method to detect ITD as expected. …”
Get full text
Get full text
Get full text
Thesis -
10
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
Get full text
Get full text
Get full text
Thesis -
11
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The verification of the proposed approach is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Thesis -
12
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
13
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
15
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
19
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
20
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis
