Search Results - (( data verification using algorithm ) OR ( parameter extraction using algorithm ))
Search alternatives:
- parameter extraction »
- verification using »
- data verification »
- extraction using »
- using algorithm »
-
1
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
2
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis -
3
Mechanical and grain growth behaviour of wire-arc additive manufacturing (WAAM) of SS316L using experiment and numerical simulation / Muhd Faiz Mat @ Muhammad
Published 2022“…The initial phase is the material verification and selection of the WAAM SS316L process parameters for thick wall structure using a Robotic welding system. …”
Get full text
Get full text
Thesis -
4
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
5
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
6
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
7
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
9
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
10
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
11
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
12
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
15
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…Verifications of the calibrated models were done using the data set of the following year. …”
Get full text
Get full text
Article -
16
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
Get full text
Get full text
Get full text
Article -
17
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
18
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…Feature extraction and matching algorithms are used in many computer vision problems, including object recognition and structure from motion. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
20
