Search Results - (( data verification using algorithm ) OR ( data estimation using algorithm ))*

Refine Results
  1. 1

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Estimating cabbage production in Cameron Highlands, Malaysia using IKONOS data. by Jusoff, Kamaruzaman

    Published 2009
    “…The potential use of airborne hyperspectral imaging data such as UPM-TropAIR’s AISA TropAIRMAPTM to map and predict the supply of cabbages should be the next step in precision farming revolution using remote sensing. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Median polish techniques for analysing paired data by Ajoge, Idris

    Published 2017
    “…Median polish algorithm is useful in removing any noise in the data by computing medians for various coordinates on the data set. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…As illustration, applications are displayed using wind and wave circular data sets.…”
    Get full text
    Get full text
    Thesis
  6. 6

    DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS by AYOUB MOHAMMED, MOHAMMED ABDALLA

    Published 2011
    “…The ANN model has been developed using resilient back-propagation learning algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…A ‘speeded-up robust features’ algorithm was used to determine the key points of interest and the Euclidean Distance was used to estimate similarity between database images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Autonomous Camera Alignment System by Salehian, Sina

    Published 2017
    “…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    An impulsive noise analyser using amplitude probability distribution (APD) for broadband-wired communication by Zainal Abidin, Ahmadun Nijar

    Published 2011
    “…It is vital to have correct measurement set-up, signal power level, sampling rate, sample points and filter characterisation in order to acquire accurate data representation of the noise patterns. The APD graph is generated by the analyser using the APD algorithm method which employs the envelope sampling technique from actual probability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  17. 17

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm by Suparman, S., Rusiman, Mohd Saifullah

    Published 2018
    “…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
    Get full text
    Article