Search Results - (( data visualization path algorithm ) OR ( data verification method algorithm ))

Refine Results
  1. 1

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia by Ahmad, Ab. Rahman, Zenon , Nasaruddin, Hassan, Haswadi

    Published 2005
    “…There are many algorithms have been designed to find these paths. The algorithms such as Djikstra, Bellman-Ford or Floyd- Warshall are difference from one to another due to the simplicity, effectiveness and duration of processing the nodes. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A Study of Visual Attention in Diagnosing Cerebellar Tumours by Kuryati, Kipli, Kasumawati, Lias, Dayang Azra, Awang Mat, Othman, A.K., Ade Syaheda Wani, Marzuki, Zamhari, N.

    Published 2009
    “…In particular, the eye-tracking data revealed which aspects of the spectrogram received more visual attention and in what order they were viewed. …”
    Get full text
    Get full text
    Article
  5. 5

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment by Wong, Peng Kiong

    Published 2004
    “…A computer program was developed to acquire measured field strength data from the spectrum analyzer and convert the values to path loss using Agilent Visual Engineering Environment (VEE). …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14
  15. 15

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…Rviz2 was utilized for visualizing coordinate frames. The algorithm was tested in both simulation and on the physical robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18
  19. 19

    Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac by Azlan, Adriana Batrisyia Noor Mohd

    Published 2024
    “…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
    Get full text
    Get full text
    Thesis
  20. 20

    The evolution and trend of chain code scheme by Wulandhari, Lily Ayu, Haron, Habibollah

    Published 2008
    “…This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
    Get full text
    Get full text
    Get full text
    Article