Search Results - (( variable detection method algorithm ) OR ( processes verification method algorithm ))
Search alternatives:
- processes verification »
- verification method »
- variable detection »
- method algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
4
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
Get full text
Get full text
Thesis -
5
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The method consists of two main stages; the process to distinguish children from adult based on input facial image and the process to verify children age range. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
8
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
9
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
10
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
11
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
12
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
13
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
Get full text
Get full text
Get full text
Thesis -
14
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
15
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
16
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
17
Integrated face detection approach for far image application
Published 2016“…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
Get full text
Get full text
Thesis -
18
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter -
19
Enhanced face recognition using discrete cosine transform
Published 2016“…In signal processing, important information is mainly required and processed. …”
Get full text
Get full text
Get full text
Article -
20
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis
