Search Results - (( data verification method algorithm ) OR ( parallel estimation using algorithm ))*
Search alternatives:
- verification method »
- parallel estimation »
- data verification »
- method algorithm »
- using algorithm »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
2
Forward masking threshold estimation using neural networks and its application to parallel speech enhancement
Published 2010“…Moreover, a parallel implementation of the speech enhancement algorithm was developed using Matlab parallel computing toolbox.…”
Get full text
Get full text
Get full text
Article -
3
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
4
A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling
Published 2009“…This paper presents the application of Parallel Genetic Algorithm (PGA)-based Takagi Sugeno Kang (TSK)-Fuzzy approach for dynamic car-following modeling in the traffic simulation software. …”
Get full text
Get full text
Article -
5
New algorithm for gyroless spacecraft angular rate Estimation and its application
Published 2006“…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
Get full text
Get full text
Article -
6
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
Get full text
Get full text
Thesis -
7
-
8
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009“…The proposed hardware accelerator can be used in different disciplines from low bit rate to high bit rate by making a tradeoff between the degree of parallelism or using fast algorithm or a combination of both.…”
Get full text
Get full text
Conference or Workshop Item -
9
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
11
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
12
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A novel architecture to verify offline hand-written signatures using convolutional neural network
Published 2023Conference Paper -
14
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth. It is a computational intensive algorithm, but can be implemented with high speed on hardware due to the parallelism property. …”
Get full text
Get full text
Conference or Workshop Item -
15
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
16
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…As each level is traversed, a biological plausibility argument is gradually strengthened. At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
Get full text
Get full text
Thesis -
17
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
19
Image reconstruction using iterative transpose algorithm for optical tomography
Published 2007“…This paper describes a transpose algorithm for use with an optical tomography system. …”
Get full text
Get full text
Get full text
Article -
20
