Search Results - (( its application testing algorithm ) OR ( based verification _ algorithm ))*
Search alternatives:
- application testing »
- based verification »
- testing algorithm »
- its application »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
2
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
3
-
4
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…The Halal Product Checker: Real-Time Ingredient Verification Application Using Text Scanning is an OCR (Optical Character Recognition) technology-based mobile application created to assist Muslims in ascertaining whether the ingredients in foods are halal. …”
Get full text
Get full text
Student Project -
5
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The objective of this study is to model the physical system of v-groove type of rotary impact driver and its application’s load. A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
6
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
7
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
8
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…The rough sets vector quantization model proved its usefulness in the speech recognition framework, however it can be extended to different applications that involve large amounts of data such as speaker verification.…”
Get full text
Get full text
Thesis -
9
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
10
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
Get full text
Get full text
Thesis -
11
Deep learning-based single-shot and real-time vehicle detection and ego-lane estimation
Published 2020“…In practice, it is exceptionally hard to accurately and efficiently develop an algorithm for FCWS application due to the complexity of steps involved in FCWS. …”
Get full text
Get full text
Get full text
Article -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
15
-
16
Improvement of vertical height accuracy using data fusion technique for terrain mapping in oil palm plantation
Published 2018“…The application has been successfully developed and tested in the field. …”
Get full text
Get full text
Get full text
Thesis -
17
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. The results of the study showed that the system is effective and promising in identifying correct human signatures presented to the system.…”
Get full text
Get full text
Get full text
Article -
20
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
