Search Results - (( global detection system algorithm ) OR ( model verification system algorithm ))
Search alternatives:
- verification system »
- global detection »
- system algorithm »
-
1
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
Get full text
Get full text
Get full text
Article -
2
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
Book chapter -
3
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…We propose a data reduction model (DIFReM) and tool which will not only help the investigator in identifying modified system files but also the ability to detect files inserted into system directories and also be able to verify integrity using hashing. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
7
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…The performances of the simplified fuzzy logic system and the normal fuzzy logic system are compared,with each model having the same number of adjustable parameters. …”
Get full text
Get full text
Article -
8
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
9
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…This paper describes the design and development of an offline signature verification system that is based on Hidden Markov Modeling (HMM) technique performed on a series of a localized direction feature extracted from a scanned signature image. …”
Article -
10
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Based on the simulation results, a notable achievement was seen for the parameters that were below 0 dB of SNR, <0.09 % global system error probability, >96 % global detection probability, <0.06 % global false alarm probability, and possessing simple complexity. …”
Get full text
Get full text
Article -
11
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Development of biosignals-based multimodal biometric system
Published 2014“…Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
Get full text
Get full text
Get full text
Thesis -
13
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…One of the favorite topic is the formal verification via model checking, which is to verify whether a mathematical model of a system meets the formal specification that describes the property to be checked. …”
Get full text
Get full text
Get full text
Technical Report -
14
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
15
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…Microarchitecture level will perform unit partitioning of the system and block partitioning of the units. RTL modelling using Verilog will be performed on each block following the units and eventually the complete system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…The metric equation of the EXP-BET algorithm is modelled and simulated using the MATLAB Simulink environment and System Generator tool provided by Xilinx. …”
Get full text
Get full text
Thesis -
19
A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system
Published 2024“…As the photovoltaic (PV) systems expands globally, robust defect detection and precise localization technologies becomes crucial to ensure their operational efficiency. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
