Search Results - (( using verification using algorithm ) OR ( using detection method algorithm ))
Search alternatives:
- using verification »
- verification using »
- method algorithm »
- using algorithm »
- using detection »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
2
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
5
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
6
Human Spontaneous Emotion Detection System
Published 2018“…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
Get full text
Get full text
Get full text
Thesis -
8
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
Get full text
Get full text
Get full text
Thesis -
9
Deep learning-based single-shot and real-time vehicle detection and ego-lane estimation
Published 2020“…These involve an elaborated FCWS pipeline using classical computer vision methods which limits the robustness of the overall system and limits the scalability of the algorithm. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…We classify the cluster group that exceeds the stopping rule as potential outliers. Model verification of all method and model proposed in this study are examined using the simulation study. …”
Get full text
Get full text
Thesis -
12
ECG biometric verification incorporating different physiological conditions
Published 2025“…Then, Pan Tompkins algorithm is used to segment the QRS complexes. The segmented signals are overlapped and align with each other to observe its pattern. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
14
Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel
Published 2018“…Further verification done using ultrasonic method also proves the inability of conventional NDT&E method to detect ITD as expected. …”
Get full text
Get full text
Get full text
Thesis -
15
A comparative evaluation on data transformation approach for artificial speech detection
Published 2024“…The rise of voice biometrics has transformed user authentication and offered enhanced security and convenience while phasing out less secure methods. Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Noise removal methodologies for lung cancer diagnosis
Published 2019“…Then, the method will be tested and verified to detect the cancer in the lung image. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The verification of the proposed approach is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Thesis -
19
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
20
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
