Search Results - (( java implication based algorithm ) OR ( data verification means algorithm ))
Search alternatives:
- verification means »
- implication based »
- data verification »
- java implication »
- means algorithm »
-
1
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
Get full text
Get full text
Thesis -
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
Published 2015“…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Least significant bits (LSB) were used by the techniques to encrypt authentication data. By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
Get full text
Get full text
Thesis -
7
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
Get full text
Get full text
Thesis -
9
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. In this project, a neural network is trained to store the passwords and replace verification table. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…The predictive model includes 16 prediction processes with 20 back-propagation algorithms whereby radar imageries and meteorological station data were used as a raw data input. …”
Get full text
Get full text
Thesis -
11
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…It was found that (by the Group Method of Data Handling algorithm), length of the pipe, wellhead pressure, and angle of inclination have a pronounced effect on the pressure drop estimation under these conditions. …”
Get full text
Get full text
Thesis -
12
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. In this research, data is collected from reputed stock markets; New York Stock Exchange (NYSE), NASDAQ and emerging markets; Dhaka Stock Exchange (DSE), Bursa Malaysia. …”
Get full text
Get full text
Thesis -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
-
15
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…For the Data Part, 200 sets of UserID and Passwords were created and encoded into binary as the input. …”
Get full text
Get full text
Get full text
Article -
16
Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems
Published 2019“…Initially, the experimental rig was designed and integrated with the instrumentation system for vibration data collection purpose. The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
17
Comparision Between Adaptive Digital Base Band Predistortion Technique And Other Techniques For Power Amplifier
Published 2008“…By analyzing the output signal and the desired signal, the adaptation algorithm will update this data until finding the optimum values. …”
Get full text
Get full text
Thesis -
18
Improvement of vertical height accuracy using data fusion technique for terrain mapping in oil palm plantation
Published 2018“…The result indicates that filtering algorithm in TerraScan was good enough to be used for TLS data in oil palm plantation. …”
Get full text
Get full text
Get full text
Thesis -
19
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
Get full text
Get full text
Get full text
Thesis -
20
