Search Results - (( global detection system algorithm ) OR ( based verification system algorithm ))
Search alternatives:
- verification system »
- based verification »
- global detection »
- system algorithm »
-
1
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
2
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
Get full text
Get full text
Get full text
Article -
3
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. …”
Get full text
Get full text
Thesis -
4
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
Book chapter -
5
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
Article -
6
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
Published 2023“…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
8
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…Principal Component Analysis (Pca) Is Utilized In This System. The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
10
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
11
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
12
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…As a result of this project, the system successfully verifies the signature based on the Neural Network algorithm. …”
Get full text
Get full text
Thesis -
17
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
18
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
19
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Based on the simulation results, a notable achievement was seen for the parameters that were below 0 dB of SNR, <0.09 % global system error probability, >96 % global detection probability, <0.06 % global false alarm probability, and possessing simple complexity. …”
Get full text
Get full text
Article -
20
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper
