Search Results - (( data normalization based algorithm ) OR ( data verification using algorithm ))
Search alternatives:
- normalization based »
- data normalization »
- verification using »
- data verification »
- using algorithm »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
2
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
3
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…Verifications of the calibrated models were done using the data set of the following year. …”
Get full text
Get full text
Article -
4
Dose verification procedures in radiotherapy
Published 1999“…Based on 6 MV input beam data, geometry of the phantom and the chosen treatment set up, the computer generated the isodose curves for each test condition. …”
Get full text
Get full text
Conference or Workshop Item -
5
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring patterns / Wan Abdul Qayyum Moh Salleh
Published 2013“…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
Get full text
Get full text
Student Project -
6
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring pattern: article / Wan Abdul Qayyum Moh Salleh and A.K. Halim
Published 2013“…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
Get full text
Get full text
Article -
7
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…Based on the statistical results, all of the measured data were normally distributed and can be discriminated since the significant value for normality test for all measured data were greater than 0.05 and paired sample t-test showed significant value less than 0.05. …”
Get full text
Get full text
Thesis -
8
Optimization of solenoid driver and controller for gaseous fuel high-pressure direct injector using model-based approach
Published 2022“…An optimization study was conducted using Normal Boundary Intersection (NBI) algorithm in MATLAB Model-Based Calibration (MBC) Toolbox to produce an optimal injector setup. …”
Get full text
Get full text
Thesis -
9
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Banking on this, region labeling assigns the labels of either background or foreground region based on a proposed graph coloring algorithm, which considers trajectory-based features. …”
Get full text
Get full text
Get full text
Thesis -
10
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
Get full text
Get full text
Get full text
Article -
11
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
12
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
14
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
15
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
16
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
17
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
18
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021Get full text
Get full text
Conference or Workshop Item
