Search Results - (( java implication tree algorithm ) OR ( based verification means algorithm ))
Search alternatives:
- based verification »
- verification means »
- java implication »
- implication tree »
- means algorithm »
- tree algorithm »
-
1
-
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
3
-
4
Contactless palmprint verification using siamese networks
Published 2022“…Biometric based identification technology can be seen taking multiple forms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
6
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
Get full text
Get full text
Thesis -
7
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
Published 2015“…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
11
Signal quality measures for unsupervised blood pressure measurement
Published 2012“…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
Get full text
Get full text
Get full text
Article -
12
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Thesis -
13
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
14
-
15
Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems
Published 2019“…The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
16
-
17
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…As a result, a password-based user authentication system for smart home by using neural network had been developed successfully.…”
Get full text
Get full text
Get full text
Article -
18
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Widespread models like Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Evolutionary Strategy (ES) and Population-Based Incremental Learning (PBIL) dealing with the specified problems are also explored and compared. …”
Get full text
Get full text
Thesis -
19
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Banking on this, region labeling assigns the labels of either background or foreground region based on a proposed graph coloring algorithm, which considers trajectory-based features. …”
Get full text
Get full text
Get full text
Thesis -
20
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…FE model was developed and validated based on Z. Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item
