Search Results - (( using vector method algorithm ) OR ( based verification method algorithm ))

Refine Results
  1. 1

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…The personal identity verification in a random population using kernel-based binary and one-class Support Vector Machines (SVMs) has been considered by other biometric traits, but has been so far left aside for analysis of ECG signals. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The thesis proposes a novel ECG verification technique based on non-fiducial approach which explores waveform itself using kernel methods for feature extraction and classification after preprocessing (denoising ECG signals) one lead ECG signals of 52 subjects. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…For example, in video compression, the use of motion vectors on individual macro-blocks optimized the motion vector information. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9
  10. 10
  11. 11

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  16. 16
  17. 17

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…The eigenfaces is projected onto human faces to identify the features vector. These significant features vector are further refine using Gaussian kernel. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system by M. W., Mustafa, H., Shareef, M. H., Sulaiman, S. N., Abd. Khalid, S. R., Abd. Rahim, Omar, Aliman

    Published 2011
    “…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
    Conference Paper