Search Results - (( data verification using algorithm ) OR ( parallel selection method algorithm ))
Search alternatives:
- verification using »
- parallel selection »
- data verification »
- selection method »
- method algorithm »
- using algorithm »
-
1
Parallel algorithms on some numerical techniques using PVM platform on a cluster of workstations
Published 2002“…In this paper, a few parallel algorithms are explained in solving one dimensional heat model problem using Parallel Virtual Machine (PVM). …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
3
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
4
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
Get full text
Get full text
Thesis -
6
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
7
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Guided genetic algorithm for solving unrelated parallel machine scheduling problem with additional resources
Published 2022“…Additionally, an appropriate selection of GA operators was also experimented. The guide genetic algorithm (GGA) is not used to solve the unspecified dynamic UPMR. …”
Get full text
Get full text
Get full text
Article -
10
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
11
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
12
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
13
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
15
ROA-CONS: raccoon optimization job scheduling
Published 2021“…In comparison with other well-known job scheduling algorithms, the simulation assesses the effectiveness of the proposed method. …”
Get full text
Get full text
Article -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
17
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
18
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…Verifications of the calibrated models were done using the data set of the following year. …”
Get full text
Get full text
Article -
19
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
20
Application Of Genetic Algorithms For Robust Parameter Optimization
Published 2010“…Genetic algorithms (GA) are fairly recent in this respect but afford a novel method of parameter optimization. …”
Get full text
Get full text
Article
