Search Results - (( data verification using algorithm ) OR ( variable estimation using algorithm ))

Refine Results
  1. 1

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  2. 2

    DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS by AYOUB MOHAMMED, MOHAMMED ABDALLA

    Published 2011
    “…The ANN model has been developed using resilient back-propagation learning algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…The fixed block matching uses the same block size throughout the motion estimation process while the variable block matching uses different block size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…The reweighted fast, consistent and high breakdown (RFCH) estimator is a multivariate procedure used to estimate the robust location and scatter matrix. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10
  11. 11

    Assessment of forest aboveground biomass estimation from superview-1 satellite image using machine learning approaches / Azinuddin Mohd Asri by Mohd Asri, Azinuddin

    Published 2022
    “…The suitable independent variables (hL, DBH, and CPA) were vital to estimating the dependent variable (Sc) and producing a carbon stock map for the final result. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A hybrid genetic algorithm and linear regression for prediction of NOx emission in power generation plant by Bunyamin M.A., Yap K.S., Aziz N.L.A.A., Tiong S.K., Wong S.Y., Kamal M.F.

    Published 2023
    “…This paper presents a new approach of gas emission estimation in power generation plant using a hybrid Genetic Algorithm (GA) and Linear Regression (LR) (denoted as GA-LR). …”
    Conference paper
  16. 16

    Intelligent biometric signature verification system incorporating neural network by Lim, Boon Han, Mailah, Musa

    Published 2005
    “…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Daily streamflow forecasting using simplified rule-based fuzzy logic system by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin, Harun, Sobri

    Published 2005
    “…Verifications of the calibrated models were done using the data set of the following year. …”
    Get full text
    Get full text
    Article
  18. 18

    Electricity demand forecasting in Turkey and Indonesia using linear and nonlinear models based on real-value genetic algorithm and extended Nelder-Mead local search by Wahab, Musa

    Published 2014
    “…These problems resulted in estimation errors and high computational cost. Hybrid genetic algorithm (GA) and Nelder-Mead local search mode 1 has been used to minimize demand estimation errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Robust Estimation Methods And Outlier Detection In Mediation Models by Fitrianto, Anwar

    Published 2010
    “…The Ordinary Least Squares (OLS) method is often use to estimate the parameters of the mediation model. …”
    Get full text
    Get full text
    Thesis
  20. 20