Search Results - (( its verification system algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification system »
- implication based »
- its verification »
- system algorithm »
- java implication »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
4
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
-
7
-
8
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Users reported an enhancement in their confidence to make halal food choices, with speedier decisions and accurate real-time verification. Results confirmed the app’s effectiveness in streamlining the halal verification process, solving problems such as ambiguous ingredient lists and the absence of real-time verification tools in other systems. …”
Get full text
Get full text
Student Project -
9
Finger vein verification
Published 2009“…At present, biometric system is well - liked as its high security level manage to reduce frauds, intrudes and forgeries. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
11
-
12
-
13
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…The hill climbing algorithm is the most common method of MPPT due to its simplicity, ease of implementation, and good performance. …”
Get full text
Get full text
Thesis -
14
Contactless palmprint verification using siamese networks
Published 2022“…Due to the COVID-19 pandemic, biometric based authentication systems have become increasingly in demand due to its ease of configuration and convenience of usage. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
An enhanced fingerprint template protection scheme
Published 2022“…The results demonstrate that the enhanced chaos-based encryption algorithm for FTP improves its encryption time, which is 0.24 seconds faster than the selected benchmark study. …”
Get full text
Get full text
Thesis -
16
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
17
-
18
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…This thesis presents a potential algorithm for continuation power flow in order to find a power flow solution at its bifurcation point. …”
Get full text
Get full text
Thesis -
19
Implementation of 16-QAM alamouti encoder on FPGA for MIMO testbed / Mohd Aminudin Mohd Khalid
Published 2014“…Finally the system is executed on Polarizone MEMO Testbed and data acquisition is performed for system verification. …”
Get full text
Get full text
Thesis -
20
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report
