Search Results - (( data verification method algorithm ) OR ( data integration method algorithm ))
Search alternatives:
- verification method »
- integration method »
- data verification »
- method algorithm »
- data integration »
-
1
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
2
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
3
A novel architecture to verify offline hand-written signatures using convolutional neural network
Published 2023Conference Paper -
4
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…This work explores the method of increasing the data bus size of the microprocessor from 32/64 bits to 128/256/512 bits to allow for more data crunching capability. …”
Get full text
Thesis -
5
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
6
Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method
Published 2015“…In the literature, mostly statistical and machine learning methods are used individually; however, their integration can enhance the final output. …”
Get full text
Get full text
Get full text
Article -
7
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…Simulation analyses using Matlab Software have been conducted for results validation and verification. Furthermore, a performance comparison between the proposed method and a model-based controller design has been carried out. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
Get full text
Get full text
Thesis -
9
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. Methods/Analysis:The proposed framework is divided into four layers with each performing authentication, verification and integrity at different levels of communication between entities. …”
Get full text
Get full text
Get full text
Article -
10
Multi-stage feature selection in identifying potential biomarkers for cancer classification
Published 2022“…Many algorithms have been applied and introduced in this area, yet the challenge of high dimensionality of gene expression data remains and it could lead to the existence of noise that could negatively impact the analysis outcome. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
12
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…In conclusion, the multiple moving object detection technique proposed in this study is robust to unknown transformations, with significant improvements in overall precision and recall compared to existing methods. The proposed algorithm is designed in order to tackle many limitations of the existing algorithms such as handle inevitable occlusions, model different motions from multiple moving objects, and consider the spatial information.…”
Get full text
Get full text
Get full text
Thesis -
13
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
15
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
16
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
Get full text
Get full text
Thesis -
17
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
Get full text
Get full text
Thesis -
18
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
19
-
20
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
