Search Results - (( process verification method algorithm ) OR ( data distribution function algorithm ))
Search alternatives:
- process verification »
- verification method »
- function algorithm »
- data distribution »
- method algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
4
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The method consists of two main stages; the process to distinguish children from adult based on input facial image and the process to verify children age range. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
7
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
8
-
9
Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm
Published 2018“…In the hierarchical Bayesian approach, the order and coefficients of the autoregressive model are assumed to have a prior distribution. The prior distribution is combined with the likelihood function to obtain a posterior distribution. …”
Get full text
Article -
10
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter -
11
Enhanced face recognition using discrete cosine transform
Published 2016“…In signal processing, important information is mainly required and processed. …”
Get full text
Get full text
Get full text
Article -
12
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
Get full text
Get full text
Thesis -
13
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…Thereafter, a multi-objective hybrid algorithm (MOHA), an extension of the self-adaptive hybrid algorithm is proposed and tested on the established multi-objective (MO) test functions. …”
Get full text
Get full text
Thesis -
14
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The results involve the verification of the proposed method and mathematical example using three (3) prime numbers. …”
Get full text
Get full text
Student Project -
15
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. These sites are in the Peninsular of Malaysia. …”
Get full text
Get full text
Thesis -
16
A new Gompertz-three-parameter-lindley distribution for modeling survival time data
Published 2025“…The statistical properties of the proposed distribution including the shape properties, cumulative distribution, quantile functions, moment generating function, failure rate function, mean residual function, and stochastic orders are studied. …”
Get full text
Get full text
Get full text
Article -
17
Reliability Analysis and Prediction of Time to Failure Distribution of an Automobile Crankshaft
Published 2015“…The developed stochastic algorithm has the capability to measure the parametric distribution function and validate the predict the reliability rate, mean time to failure and hazard rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The main contribution of this research is developing statistical approaches, and introducing new algorithms and resampling methods for analysing interval-censored data through AFT models.…”
Get full text
Get full text
Get full text
Thesis -
19
Slice sampler algorithm for generalized pareto distribution
Published 2018“…In this paper, we developed the slice sampler algorithm for the generalized Pareto distribution (GPD) model. …”
Get full text
Get full text
Article -
20
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…In order to evaluate the scalability at specific data size the appropriate regression models are fitted through the measured data as functions of number of workers. …”
Get full text
Get full text
Thesis
