Search Results - (( based constructive method algorithm ) OR ( based verification method algorithm ))
Search alternatives:
- verification method »
- based constructive »
- based verification »
- method algorithm »
-
1
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
3
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
4
-
5
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…In this study, we propose an alternative method of constructing a confidence interval based from the distribution of the estimated value of error concentration parameter obtained from the Fisher information matrix. …”
Get full text
Get full text
Thesis -
6
Verification of volume-of-fluid (VOF) simulation for thin liquid film applications
Published 2023“…Comparisons of the VOF-calculated surface profiles with the ones obtained using the explicit surface tracking algorithms such as the Boundary Element Method (BEM) reported in the literature showed that the VOF model is able to produce the expected profiles of thin liquid film flowing a two-dimensional rectangular cavity and thus can be considered for simulation of other applications involving thin liquid film flows, provided the grid refinement based on the volume fraction gradient is applied. �2009 IEEE.…”
Conference paper -
7
-
8
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
Get full text
Get full text
Thesis -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
10
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
11
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…FE model was developed and validated based on Z. Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item -
12
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
13
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…Hence, the fusion of UAV-based DEMs. This study aimed: (i) to develop models for investigating the effect of Atmospheric Pressure (AP) on DEMs generated from fixed-wing UAV platform, (ii) to develop a methodological approach for determining an optimum flying altitude for UAV cadastral mapping and (iii) to develop fusion and filtering algorithms for improving the vertical accuracy of DEM generated by UAV systems. …”
Get full text
Get full text
Thesis -
14
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
15
-
16
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
17
Face identification and verification using PCA and LDA
Published 2008“…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
20
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter
