Search Results - (( data verification method algorithm ) OR ( data integration method algorithm ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…This work explores the method of increasing the data bus size of the microprocessor from 32/64 bits to 128/256/512 bits to allow for more data crunching capability. …”
    Get full text
    Thesis
  5. 5
  6. 6

    Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method by Tehrany, Mahyat Shafapour, Pradhan, Biswajeet, Jebur, Mustafa Neamah

    Published 2015
    “…In the literature, mostly statistical and machine learning methods are used individually; however, their integration can enhance the final output. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A fictitious reference iterative tuning method for buck converter-powered DC motor control system by Mohd Syakirin, Ramli, Sian, Seet Meng, Mohd Naharudin, Salim, Hamzah, Ahmad

    Published 2019
    “…Simulation analyses using Matlab Software have been conducted for results validation and verification. Furthermore, a performance comparison between the proposed method and a model-based controller design has been carried out. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An enhanced motion planning method for industrial robots based on the digital twin concept by Rui, Fan

    Published 2025
    “…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. Methods/Analysis:The proposed framework is divided into four layers with each performing authentication, verification and integrity at different levels of communication between entities. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multi-stage feature selection in identifying potential biomarkers for cancer classification by Wong, Yit Khee, Chan, Weng Howe, Nies, Hui Wen, Moorthy, Kohbalan

    Published 2022
    “…Many algorithms have been applied and introduced in this area, yet the challenge of high dimensionality of gene expression data remains and it could lead to the existence of noise that could negatively impact the analysis outcome. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In conclusion, the multiple moving object detection technique proposed in this study is robust to unknown transformations, with significant improvements in overall precision and recall compared to existing methods. The proposed algorithm is designed in order to tackle many limitations of the existing algorithms such as handle inevitable occlusions, model different motions from multiple moving objects, and consider the spatial information.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping by Isola, Ajibola Ismaila

    Published 2020
    “…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item