Search Results - (( data verification using algorithm ) OR ( data estimation using algorithm ))*
Search alternatives:
- verification using »
- data verification »
- using algorithm »
- data estimation »
-
1
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Estimating cabbage production in Cameron Highlands, Malaysia using IKONOS data.
Published 2009“…The potential use of airborne hyperspectral imaging data such as UPM-TropAIR’s AISA TropAIRMAPTM to map and predict the supply of cabbages should be the next step in precision farming revolution using remote sensing. …”
Get full text
Get full text
Article -
3
-
4
Median polish techniques for analysing paired data
Published 2017“…Median polish algorithm is useful in removing any noise in the data by computing medians for various coordinates on the data set. …”
Get full text
Get full text
Thesis -
5
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…As illustration, applications are displayed using wind and wave circular data sets.…”
Get full text
Get full text
Thesis -
6
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…The ANN model has been developed using resilient back-propagation learning algorithm. …”
Get full text
Get full text
Thesis -
7
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…A ‘speeded-up robust features’ algorithm was used to determine the key points of interest and the Euclidean Distance was used to estimate similarity between database images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Autonomous Camera Alignment System
Published 2017“…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
Get full text
Get full text
Final Year Project -
9
New differential cryptanalysis results for the lightweight block cipher BORON
Published 2023Article -
10
-
11
An impulsive noise analyser using amplitude probability distribution (APD) for broadband-wired communication
Published 2011“…It is vital to have correct measurement set-up, signal power level, sampling rate, sample points and filter characterisation in order to acquire accurate data representation of the noise patterns. The APD graph is generated by the analyser using the APD algorithm method which employs the envelope sampling technique from actual probability. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
13
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
14
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
15
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
16
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
17
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
18
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
19
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
20
Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm
Published 2018“…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
Get full text
Article
