Search Results - (( some applications using algorithm ) OR ( its application warping algorithms ))*
Search alternatives:
- application warping »
- applications using »
- warping algorithms »
- some applications »
- using algorithm »
- its application »
-
1
-
2
-
3
NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition
Published 2006“…The idea behind this method is due to neural network (NN) limitation where a fixed amount of input nodes is needed for every input class especially in the application of multiple inputs. The new feature processing used the modified version of traditional DTW called as DTW-FF algorithm to fix the input size so that the source and template frames have equal number of frames. …”
Get full text
Get full text
Article -
4
VOICE RECOGNITION FOR SECURITY PURPOSES
Published 2007Get full text
Get full text
Final Year Project -
5
Animal voice recognition for identification (ID) detection system
Published 2011Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Modelling and simulation of drying process for ceramic membrane fabrication
Published 2015“…For ages, ceramic properties and structure is known for its brittleness and its failure such as cracking and warping. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
10
-
11
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
12
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
16
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Conference or Workshop Item -
17
A block-based multi-scale background extraction algorithm
Published 2010“…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
Get full text
Get full text
Article -
18
Test Data Generation for Event Driven System Using Bees Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article
