Search Results - (( its applications using algorithm ) OR ( based verification _ algorithm ))*
Search alternatives:
- applications using »
- based verification »
- its applications »
- using algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
3
-
4
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
5
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper -
6
-
7
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
8
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
9
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…The Halal Product Checker: Real-Time Ingredient Verification Application Using Text Scanning is an OCR (Optical Character Recognition) technology-based mobile application created to assist Muslims in ascertaining whether the ingredients in foods are halal. …”
Get full text
Get full text
Student Project -
10
Using Bimodal Gaussian Mixture Model-Based Algorithm for Background Segmentation in Thermal Fever Mass Screening
Published 2011“…Hitherto, in most of installed thermal imaging in airports, this problem is only solved by human operators, thus its effectiveness is influenced by human factors. In this paper, an algorithm based on Gaussian Bi -modal Mixture Models (GBMM) is proposed for background-foreground segmentation as an important feature to identify medial canthal area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
12
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The objective of this study is to model the physical system of v-groove type of rotary impact driver and its application’s load. A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
13
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
14
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
15
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…The rough sets vector quantization model proved its usefulness in the speech recognition framework, however it can be extended to different applications that involve large amounts of data such as speaker verification.…”
Get full text
Get full text
Thesis -
16
Bit-error rate performance analysis of spectrum based detector for FSK digital modulation
Published 2003“…Further availability of digital signal processing algorithms such as the FFT (Fast Fourier Transform) and necessary supporting technology makes it possible to implement spectrum based deteetor for FSK. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Contactless palmprint verification using siamese networks
Published 2022“…Biometric based identification technology can be seen taking multiple forms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
19
A comparative study of vibrational response based impact force localization and quantification using different types of neural networks / Wang Yanru
Published 2018“…In the study, the effort to find better neural network algorithms in the application of impact force indetification continues. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis
