Search Results - (( using function method algorithm ) OR ( subject identification based algorithm ))
Search alternatives:
- subject identification »
- identification based »
- method algorithm »
- function method »
- using function »
-
1
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
2
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…A gain-based correction method; probability density function model are used to cluster white and gray matters, cerebrospinal fluid, and meninges. …”
Get full text
Get full text
Thesis -
4
Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning
Published 2022“…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Data mining in mobile ECG based biometric identification
Published 2014“…Therefore, these outcomes support the usability of ECG based biometric identification in a mobile environment.…”
Get full text
Get full text
Get full text
Article -
6
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
7
Development of an effective clustering algorithm for older fallers
Published 2022“…The proposed fall risk clustering algorithm grouped the subjects according to features. …”
Get full text
Get full text
Article -
8
A subject identification method based on term frequency technique
Published 2017“…In this paper, a subject identification method which is based on term frequency to categorize groups of text into a particular subject is proposed. …”
Get full text
Get full text
Get full text
Article -
9
Language identification system using Matlab: design, implementation, and sample codes
Published 2017“…This book investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
Get full text
Get full text
Book -
10
Development of language identification system using MFCC and vector quantization
Published 2017“…This paper investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Hardware And Software Development Of ECG Biometric System
Published 2018“…The performance evaluation shows that 93.65% of overall system performance and 85% of individual subject accuracy based on 10 different subject’s training data and 20 different subject’s testing. …”
Get full text
Get full text
Monograph -
12
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
Get full text
Get full text
Monograph -
13
Face identification and verification using PCA and LDA
Published 2008“…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
Get full text
Get full text
Conference or Workshop Item -
14
Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System
Published 2013“…The feature of subject detected is analysed to improve the identification of the existence of the potentially harmful subject. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
17
Person identification in irregular cardiac conditions using electrocardiogram signals
Published 2011“…This paper presents a person identification mechanism in irregular cardiac conditions using ECG signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
19
Determining the preprocessing clustering algorithm in radial basis function neural network
Published 2008“…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
Get full text
Get full text
Article -
20
Autonomous Camera Alignment System
Published 2017“…The subject’s face will first be detected by using the Ada-boost algorithm with Haar cascades, and the width and height of the face will then be translated from pixel to millimeter. …”
Get full text
Get full text
Final Year Project
