Search Results - (( parameter evaluation method algorithm ) OR ( based verification system algorithm ))
Search alternatives:
- parameter evaluation »
- verification system »
- based verification »
- method algorithm »
- system algorithm »
-
1
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…Later, the dynamic configuration algorithm was designed to utilize possible support assignments based on support provision requirements. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
3
Dynamic modelling and control of a flexible manipulator
Published 2003“…The command shaping techniques are designed based on the parameters of the system obtained using the unshaped bang-bang torque input. …”
Get full text
Get full text
Get full text
Thesis -
4
Modelling and calibration of high-pressure direct injection compressed natural gas engine
Published 2021“…The objectives of the study are 1) to analyse the effect of HPDI-CNG system configuration and influential parameters, 2) to evaluate the injector mass flow rate and its suitability to fulfil engine requirement, 3) to assess the HPDI-CNG vehicle performance as a whole, and 4) to calibrate the electronic control unit (ECU) base maps by using MBC procedure. …”
Get full text
Get full text
Thesis -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…Principal Component Analysis (Pca) Is Utilized In This System. The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
8
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
9
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
10
-
11
-
12
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…As a result of this project, the system successfully verifies the signature based on the Neural Network algorithm. …”
Get full text
Get full text
Thesis -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
15
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
16
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
17
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
18
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…The approximation of the response then evaluated to check the fitness of the model to the true system. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item
