Search Results - (( wave estimation method algorithm ) OR ( data verification method algorithm ))*

Refine Results
  1. 1

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…As illustration, applications are displayed using wind and wave circular data sets.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model by Yazid, Edwar, Liew, M. S., Parman, Setyamartana, Kurian, V.J.

    Published 2013
    “…The proposed approach outlined here has shown the tremendous potential in the estimation of transfer function. The results indicate that TVARX model produces accurate, smooth and less noise TF estimates over DFT method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Seismic wave modeling and high-resolution imaging by Bashir, Y., Ghosh, D.P., Alashloo, S.Y.M.

    Published 2022
    “…The wave-modeling and imaging algorithm is implemented on two velocity models: the Marmousi model and the Sigsbee model. …”
    Get full text
    Get full text
    Book
  5. 5

    Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam, Gomes, Chandima

    Published 2016
    “…The proposed method can be helpful for creating lightning location and lightning current data banks as it can estimate the full shape of the current as opposed to the usual methods used previously.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance of DOA estimation algorithms for acoustic localization of indoor flying drones using artificial sound source by Syaril, Azrad, Salman, Abdulaziz, Al-Haddad, Syed Abdul Rahman

    Published 2024
    “…The strategy is simulated to assess localization performance of three different types of chirping sounds indoors using six microphone arrays. The estimated direction of arrival (DOA) of the chirping sound is calculated using several published algorithms that include MUSIC, CSSM, SRP-PHAT, TOPS and WAVES. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan by Ruslan, Haslinah

    Published 1996
    “…To overcome the problem, Capon method is introduced. Capon method provides high resolution estimation of the DOA of the multipath radio signals. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes by Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Patrice Boursier, Shahrulniza Musa

    Published 2013
    “…This research is focusing on the precise location estimation of mobile node by using k - nearest neighbor algorithm (k-NN). …”
  14. 14

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…The numerical finite-difference method is chosen as a platform for discretizing the wave equations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models by Mohd Aris, M.N., Daud, H., Mohd Noh, K.A., Dass, S.C.

    Published 2022
    “…The resulting error measurements and the computational time revealed that GPR can estimate the marine CSEM responses efficiently and at par to the current methods. …”
    Get full text
    Get full text
    Article
  18. 18

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20