Search Results - (( _ evaluation based algorithm ) OR ( based verification system algorithm ))
Search alternatives:
- verification system »
- based verification »
- evaluation based »
- system algorithm »
-
1
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
2
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
3
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…This study evaluates the robustness of the FLDA-based ballistic identification algorithm against fixed-value impulse noise, including pepper, salt, and salt-and-pepper noise. …”
Get full text
Get full text
Get full text
Article -
4
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
5
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
7
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The aim of this study is to accurately evaluate the semantic complexity of English text through an autoencoder structure based on bidirectional attention. …”
Get full text
Get full text
Article -
8
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
9
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
10
Finger vein verification
Published 2009“…This trait offers a higher security because for gery is extremely difficult. The finger vein verification project verifies a person‟s identity based on the vein patterns. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. …”
Get full text
Get full text
Get full text
Article -
12
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
13
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
Get full text
Get full text
Article -
14
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
15
A Web Based System For Evaluating Occupational Stress
Published 2007Get full text
Get full text
Get full text
Article -
16
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…Later, the dynamic configuration algorithm was designed to utilize possible support assignments based on support provision requirements. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
18
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…An improvement is needed on this factor, which could increase the accuracy of the system in the future. The objectives of this research are to develop a Malaysian license plate recognition system using a Convolutional Neural Network (CNN) on a web application and evaluate the performance of the system based on accuracy and loss values. …”
Get full text
Get full text
Student Project -
19
-
20
