Search Results - (( java implication tree algorithm ) OR ( based verification means algorithm ))

Refine Results
  1. 1
  2. 2

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Contactless palmprint verification using siamese networks by Ng, Jan Hui

    Published 2022
    “…Biometric based identification technology can be seen taking multiple forms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  6. 6

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks by Said, Mohamed Abdisalan

    Published 2015
    “…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Signal quality measures for unsupervised blood pressure measurement by Abdul Sukora, Jumadi, Redmond, S J, Chan, G S H, Lovell, N H

    Published 2012
    “…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems by Annisa, Jamali, Muhammad Sukri, Hadi, Hanim, Mohd Yatim, Mat Hussin, Ab Talib, Intan Zaurah, Mat Darus

    Published 2019
    “…The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16
  17. 17

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…As a result, a password-based user authentication system for smart home by using neural network had been developed successfully.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Widespread models like Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Evolutionary Strategy (ES) and Population-Based Incremental Learning (PBIL) dealing with the specified problems are also explored and compared. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Banking on this, region labeling assigns the labels of either background or foreground region based on a proposed graph coloring algorithm, which considers trajectory-based features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption by Siti Aishah, Rusdan, Tarlochan, Faris, Mohamad Rusydi, Mohamad Yasin

    Published 2013
    “…FE model was developed and validated based on Z. Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
    Get full text
    Get full text
    Conference or Workshop Item