Search Results - (( based evaluations _ algorithm ) OR ( user identification ((rsa algorithm) OR (new algorithm)) ))
Search alternatives:
- user identification »
- based evaluations »
- rsa algorithm »
- new algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
2
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. Moreover, this work is extended to integrate the SPX crossover operator with the adaptive ARDE algorithm in a new way of implementation in order to make the adaptive ARDE algorithm satisfy both the global and local search requirements. …”
Get full text
Get full text
Thesis -
3
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System
Published 2016“…This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
Get full text
Get full text
Get full text
Article -
6
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…Accordingly, this paper describes a new self-calibration methodology for nonlinear pressure sensors based on an LMBP-ANN model. …”
Get full text
Get full text
Get full text
Article -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
8
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
9
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…All images used for this study were captured by state of the art forward looking infrared (FLIR) thermal cameras and have good resolution and sensitivity. The developed algorithm needs no human intervention until the final result is displayed to the user, if the user is not satisfied with the segmentation results he/ she can appoint new seeds interactively to fine tune the segmentation. …”
Get full text
Get full text
Thesis -
10
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
11
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
12
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…Several systems require full identification of a user, as any misclassification may deteriorate the performance of the entire system. …”
Get full text
Get full text
Article -
13
-
14
-
15
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Unfortunately, password or personal identification number (PIN) verification suffers an inherent problem. …”
Get full text
Get full text
Thesis -
16
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
17
Automated music chord recognition system using Convolutional Neural Network (CNN) / Abdul Qhadir Jailani Azhari
Published 2025“…To overcome these issues, the study uses CNNs to extract features and enhance chord identification performance. The main objectives include analysing existing chord recognition algorithms, creating a prototype for real-time chord identification, and testing its performance with music recordings. …”
Get full text
Get full text
Thesis -
18
Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin
Published 2015“…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
Get full text
Get full text
Thesis -
19
A language identifier for Indonesian and Malay text document
Published 2016“…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
20
A language identifier for Indonesian and Malay text document
Published 2016“…In this research, a new language identification for language with similar topology, Malay and Indonesian language, is proposed. …”
Get full text
Get full text
Conference or Workshop Item
