Search Results - (( using verification means algorithm ) OR ( java segmentation using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5
  6. 6

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Contactless palmprint verification using siamese networks by Ng, Jan Hui

    Published 2022
    “…The four main stages are – Palmprint Image Input, Region of interest segmentation, Feature extraction and Verification. The novelties of this project are the algorithm used to segment the feature abundant region of interest from the palm image, and also the usage of a custom-built Siamese Network utilising a state-of-the-art CNN called EfficientNet as the underlying feature extractor. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Discretized Markov Chain in Damage Assessment Using Rainflow Cycle with Effects of Mean Stress On An Automobile Crankshaft by Singh, Salvinder, Abdullah, Shahrum, Nik Abdullah, Nik Mohamed

    Published 2016
    “…To quantify the fatigue damage, the strain-life curve using the fatigue mean stresses was used to model the fatigue failure of the material used in for the crankshaft at Nf = 106. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…The experiment had been carried out to evaluate the performance for different number of hidden neurons, training sets, and combination of transfer functions. Mean Square Error (MSE), training time and number of epochs are used to determine the network performance. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location nodes in the targeted and validated models were ranked using the web-based search algorithms according to the respective ranking values. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14
  15. 15

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Signal quality measures for unsupervised blood pressure measurement by Abdul Sukora, Jumadi, Redmond, S J, Chan, G S H, Lovell, N H

    Published 2012
    “…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A comparative study of vibrational response based impact force localization and quantification using different types of neural networks / Wang Yanru by Wang, Yanru

    Published 2018
    “…It may be ore accurate than MLPwhen there are multiple outputs. In addition, ANFIS uses hybrid learning algorithm. It is mixed with least mean square and gradient descent method, which cause many advantages, such as much better learning ability and less computational time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok by Bachok, Mohd Fatruz

    Published 2019
    “…The predictive model includes 16 prediction processes with 20 back-propagation algorithms whereby radar imageries and meteorological station data were used as a raw data input. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis