Search Results - (( data verification using algorithm ) OR ( parameter estimation path algorithm ))
Search alternatives:
- verification using »
- data verification »
- using algorithm »
- estimation path »
- path algorithm »
- parameter »
-
1
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…Most available ANC uses the secondary path modelling including filtered x least mean square (FxLMS) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak
Published 2018“…The algorithm works if the quadrotor undergoes a deviation, an admissible trajectory path is generated for the quadrotor rapidly return on the straight-line route. …”
Get full text
Get full text
Thesis -
3
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
4
Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model
Published 2023Conference Paper -
5
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…A novel algorithm so called laser simulator logic (LSL) has been develo ped to estimate the inertia moment when the environment is noisy and cannot use fuzzy logic algorithm. …”
Get full text
Get full text
Thesis -
6
Estimation of transformers health index based on condition parameter factor and hidden Markov model
Published 2018“…Subsequently, the future states probability distribution was computed based on the HMM prediction model and viterbi algorithm was applied to find the best optimal path sequence of HI for the respective observable condition. …”
Get full text
Get full text
Conference or Workshop Item -
7
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The proposed model serves as path-independent fatigue life estimating tool hence can be used with any type of loading conditions. …”
Get full text
Get full text
Thesis -
8
Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion
Published 2020“…The path generation algorithm was fully derived within the local maps and tested with a WMR platform in real-time.…”
Get full text
Get full text
Get full text
Article -
9
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
10
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
12
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
13
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
14
Reliability performance evaluation and integration of routing algorithm in shuffle exchange with minus one stage
Published 2012“…These routing algorithms are Zero X, Zero Y, ZeroYbit, ZeroXbit, Sequential Increasing and Sequential Decreasing Algorithm. …”
Get full text
Get full text
Thesis -
15
Genetic algorithm for control and optimisation of exothermic batch process
Published 2013“…Although the proposed genetic algorithm controller (GAC) is able to regulate the process temperature to the desired path, it does not limit the waste production effectively. …”
Get full text
Get full text
Get full text
Thesis -
16
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
17
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
20
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…Verifications of the calibrated models were done using the data set of the following year. …”
Get full text
Get full text
Article
