Search Results - (( using normalization based algorithm ) OR ( using verification using algorithm ))

Refine Results
  1. 1

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online handwritten signature recognition by length normalization using up-sampling and down-sampling by Malallah, Fahad Layth, Syed Ahmad, Sharifah Mumtazah, Wan Adnan, Wan Azizun, Arigbabu, Olasimbo Ayodeji, Iranmanesh, Vahab, Yussof, Salman

    Published 2015
    “…In this paper, we introduce an efficient algorithm for online signature length normalization by using Up-Sampling and Down-Sampling techniques. …”
    Get full text
    Get full text
    Article
  3. 3

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Daily streamflow forecasting using simplified rule-based fuzzy logic system by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin, Harun, Sobri

    Published 2005
    “…The proposed simplified fuzzy logic system was calibrated (trained) using backpropagation(BP) and recursive prediction error (RPE) algorithms. …”
    Get full text
    Get full text
    Article
  6. 6

    Dose verification procedures in radiotherapy by Zakaria, Ahmad, Idris, Nik Rusman Nik

    Published 1999
    “…In radiotheraphy the accuracy of the radiation dose to be delivered to patient is vital.In the current practice the dose to be delivered by the treatment machine is calculated using computer planning system which utilised computational algorithms based on mathematical model that takes into account the shape of treatment beam, target geometry and tissue inhomogeneities present in the patient. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Enhanced face recognition using discrete cosine transform by Fatma Susilawati, Mohamad, Mustafa, Mamat, Zahraddeen, Sufyanu

    Published 2016
    “…One of the challenges of face recognition using DCT and any other algorithm is poor illumination of the acquired images. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design and analysis of DNA sequence alignment module using Smith-Waterman scoring patterns / Wan Abdul Qayyum Moh Salleh by Moh Salleh, Wan Abdul Qayyum

    Published 2013
    “…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Design and analysis of DNA sequence alignment module using Smith-Waterman scoring pattern: article / Wan Abdul Qayyum Moh Salleh and A.K. Halim by Moh Salleh, Wan Abdul Qayyum, A.K., Halim

    Published 2013
    “…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…The best performance of the work is based on simple-sum score fusion with a piecewiselinear normalization technique which provides an EER of 0. 7%.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Banking on this, region labeling assigns the labels of either background or foreground region based on a proposed graph coloring algorithm, which considers trajectory-based features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia by Ju, Zeng, Tan, Mou Leong, Narimah Samat, Chang, Chun Kiat

    Published 2021
    “…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…These measurement input were then went through the process of classification in ANN to generate the most optimized models by using LM and SCG algorithm. There were seven optimized models selected out of 336 models generated from the classification process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Verification of volume-of-fluid (VOF) simulation for thin liquid film applications by Balachandran S., Shuaib N.H., Hasini H., Yusoff M.Z.

    Published 2023
    “…Comparisons of the VOF-calculated surface profiles with the ones obtained using the explicit surface tracking algorithms such as the Boundary Element Method (BEM) reported in the literature showed that the VOF model is able to produce the expected profiles of thin liquid film flowing a two-dimensional rectangular cavity and thus can be considered for simulation of other applications involving thin liquid film flows, provided the grid refinement based on the volume fraction gradient is applied. �2009 IEEE.…”
    Conference paper
  16. 16

    Optimization of solenoid driver and controller for gaseous fuel high-pressure direct injector using model-based approach by Mohamad Hafidzul Rahman, Alias

    Published 2022
    “…An optimization study was conducted using Normal Boundary Intersection (NBI) algorithm in MATLAB Model-Based Calibration (MBC) Toolbox to produce an optimal injector setup. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20