Search Results - (( java application stemming algorithm ) OR ( data verification based algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- verification based »
- data verification »
- java application »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
2
Intelligent biometric signature verification system incorporating neural network
Published 2005“…The system is based on data acquired from time duration, pen position and pressure signals of handwritten signatures. …”
Get full text
Get full text
Get full text
Article -
3
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
4
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
5
-
6
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
7
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
8
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
9
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. The findings suggest that integrating ML and blockchain technologies, combined with satellite data, can significantly strengthen transparency and verification in forest carbon credit markets. …”
Get full text
Get full text
Get full text
Article -
11
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…The experimental results show that Kernel Principal Component Analysis has lower error rate in binary and one-class SVMs on random unknown ECG data sets. Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
Get full text
Get full text
Conference or Workshop Item -
12
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
13
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
14
-
15
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
16
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
Get full text
Get full text
Thesis -
17
-
18
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
Get full text
Get full text
Article -
19
-
20
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis
