Search Results - (( data verification using algorithm ) OR ( based identification using algorithm ))
Search alternatives:
- based identification »
- identification using »
- verification using »
- data verification »
- using algorithm »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
2
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
3
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing
Published 2024“…The SIFT algorithm has some drawbacks and is currently widely used because of its overall efficiency, although the efficiency of a single collection is slow. …”
Conference Paper -
5
Autonomous Camera Alignment System
Published 2017“…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
Get full text
Get full text
Final Year Project -
6
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
7
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
Get full text
Get full text
Student Project -
8
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location nodes in the targeted and validated models were ranked using the web-based search algorithms according to the respective ranking values. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…The original FVRS developed only provides verification instead of identification. For identification, the image processing involves process of image pre-processing, feature extraction and classification. …”
Get full text
Get full text
Monograph -
10
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
11
An efficient iris image thresholding based on binarization threshold in black hole search method
Published 2018“…The experiment was conducted using three data set; UBIRIS, CASIA and MMU because of their superiority over others. …”
Get full text
Article -
12
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
13
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
14
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
18
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
19
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
20
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis
