Search Results - (( based verification process algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- verification process »
- based verification »
- process algorithm »
- method algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
3
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…The development of numerical simulation model started by the geometrical modelling followed by material modelling based on real scanned material using JMATPRO. A mesh sensitivity analysis was executed in order to determine the most optimized element numbers which are followed by the selection of optimized WAAM parameters based on the result of preliminary experiment process. …”
Get full text
Get full text
Thesis -
5
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The second controller design strategy is based on a cost function optimization using GAS. …”
Get full text
Get full text
Get full text
Thesis -
6
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…The optimal design is obtained by using the constrained nonlinear multivariable optimization algorithm provided by MATLAB. …”
Get full text
Get full text
Conference or Workshop Item -
7
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
8
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
9
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…Smart contracts embedded within blockchain networks can automate verification and compliance processes, enhancing efficiency while minimizing the need for human oversight. …”
Get full text
Get full text
Get full text
Article -
10
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
11
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. The results of the study showed that the system is effective and promising in identifying correct human signatures presented to the system.…”
Get full text
Get full text
Get full text
Article -
12
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
13
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
14
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
15
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
16
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Finger vein verification
Published 2009“…Generally, the finger vein images are pre - processed and a neural network algorithm is developed to verify the finger vein images. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
18
-
19
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…Next, two features are fused by using match score level fusion based on Weighted Sum-Rule. The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter
