Search Results - (( using function method algorithm ) OR ( subject identification based algorithm ))

Refine Results
  1. 1

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Passwords are frequently used to control access to restricted functions. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification by Sobhan Sheykhivand, Tohid Yousefi Rezaii, Zohreh Mousavi, Azra Delpak, Ali Farzamnia

    Published 2020
    “…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution by Salih Al-Badri, Qussay Abbas

    Published 2006
    “…A gain-based correction method; probability density function model are used to cluster white and gray matters, cerebrospinal fluid, and meninges. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning by Hiu, Theresa Wei Xin

    Published 2022
    “…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Data mining in mobile ECG based biometric identification by Sidek, Khairul Azami, Mai, Vu, Khalil, Ibrahim

    Published 2014
    “…Therefore, these outcomes support the usability of ECG based biometric identification in a mobile environment.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The proposed fall risk clustering algorithm grouped the subjects according to features. …”
    Get full text
    Get full text
    Article
  8. 8

    A subject identification method based on term frequency technique by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza, Ahmad, Faudziah, Che Pa, Noraziah, Wan Ishak, Wan Hussain, Din, Roshidi, Ahmad, Farzana Kabir

    Published 2017
    “…In this paper, a subject identification method which is based on term frequency to categorize groups of text into a particular subject is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Language identification system using Matlab: design, implementation, and sample codes by Husain, Rashida, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2017
    “…This book investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
    Get full text
    Get full text
    Book
  10. 10

    Development of language identification system using MFCC and vector quantization by Gunawan, Teddy Surya, Husain, Rashida, Kartiwi, Mira

    Published 2017
    “…This paper investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Hardware And Software Development Of ECG Biometric System by Chia, Pei Kiak

    Published 2018
    “…The performance evaluation shows that 93.65% of overall system performance and 85% of individual subject accuracy based on 10 different subject’s training data and 20 different subject’s testing. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System by Noor Amira Syuhada, Mahamad Salleh, Kamarul Hawari, Ghazali

    Published 2013
    “…The feature of subject detected is analysed to improve the identification of the existence of the potentially harmful subject. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Person identification in irregular cardiac conditions using electrocardiogram signals by Sidek, Khairul Azami, Khalil, Ibrahim

    Published 2011
    “…This paper presents a person identification mechanism in irregular cardiac conditions using ECG signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Autonomous Camera Alignment System by Salehian, Sina

    Published 2017
    “…The subject’s face will first be detected by using the Ada-boost algorithm with Haar cascades, and the width and height of the face will then be translated from pixel to millimeter. …”
    Get full text
    Get full text
    Final Year Project