Search Results - (( _ evaluation ((a algorithm) OR (new algorithm)) ) OR ( based verification based algorithm ))
Search alternatives:
- based verification »
- verification based »
- new algorithm »
- a algorithm »
-
1
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
2
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
3
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
4
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
Get full text
Get full text
Article -
5
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
6
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…In this research, our main objective is to generate a new model checking computation method based on Groebner bases algorithm for safety property analysis of distributed discrete controllers. …”
Get full text
Get full text
Get full text
Technical Report -
7
Enhanced face recognition using discrete cosine transform
Published 2016“…Appearance based techniques were also exploited for comparison with the new method, and results show that ‘ASDCT’ outperformed many renowned algorithms in the literature. …”
Get full text
Get full text
Get full text
Article -
8
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The damage, due to uncontrolled noise reciprocating motion in the machines or broadband noise from wind or other sources, is identified based on frequency testing in an operator. Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
9
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…A framework of enhanced authentication for PDF textual documents using Zigzag-lsb embedding algorithm is proposed in order to apply a new technique of watermarking scheme which can be used in general size of document, to study the current numbering of watermarking system to secure the authentication of digital documents, and evaluate the watermarking scheme for digital documents in terms of accuracy rate, and analyse the performance. …”
Get full text
Get full text
Thesis -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
12
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
13
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…This study evaluates the robustness of the FLDA-based ballistic identification algorithm against fixed-value impulse noise, including pepper, salt, and salt-and-pepper noise. …”
Get full text
Get full text
Get full text
Article -
14
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
Get full text
Get full text
Article -
15
-
16
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. …”
Get full text
Get full text
Get full text
Article -
17
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
New optimization feature for the developed open cnc controller based on ISO 6983 and ISO 14649
Published 2021“…This research aims to minimize tool path airtime during machining of input ISO codes via an ant colony optimization algorithm. A new optimized system was developed based on open architecture control (OAC) technology and interpreted STEP-NC (Standard for the Exchange of Product Model Data) programming approaches. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Finger vein verification
Published 2009“…The finger vein verification project verifies a person‟s identity based on the vein patterns. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper
