Search Results - (( its verification system algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8

    Halal product checker: real time ingredient verification application using mobile text scanning by Abd Rahim, Adam Putra

    Published 2025
    “…Users reported an enhancement in their confidence to make halal food choices, with speedier decisions and accurate real-time verification. Results confirmed the app’s effectiveness in streamlining the halal verification process, solving problems such as ambiguous ingredient lists and the absence of real-time verification tools in other systems. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Finger vein verification by Krishna Veni, Selvan.

    Published 2009
    “…At present, biometric system is well - liked as its high security level manage to reduce frauds, intrudes and forgeries. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10
  11. 11
  12. 12
  13. 13

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…The hill climbing algorithm is the most common method of MPPT due to its simplicity, ease of implementation, and good performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Contactless palmprint verification using siamese networks by Ng, Jan Hui

    Published 2022
    “…Due to the COVID-19 pandemic, biometric based authentication systems have become increasingly in demand due to its ease of configuration and convenience of usage. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…The results demonstrate that the enhanced chaos-based encryption algorithm for FTP improves its encryption time, which is 0.24 seconds faster than the selected benchmark study. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system by Jasni, Jasronita

    Published 2010
    “…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…This thesis presents a potential algorithm for continuation power flow in order to find a power flow solution at its bifurcation point. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of 16-QAM alamouti encoder on FPGA for MIMO testbed / Mohd Aminudin Mohd Khalid by Mohd Khalid, Mohd Aminudin

    Published 2014
    “…Finally the system is executed on Polarizone MEMO Testbed and data acquisition is performed for system verification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report