Search Results - (( based constructive method algorithm ) OR ( processes verification method algorithm ))
Search alternatives:
- processes verification »
- verification method »
- based constructive »
- method algorithm »
-
1
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
2
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. …”
Get full text
Get full text
Thesis -
3
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
4
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
Get full text
Get full text
Thesis -
5
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
6
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…FE model was developed and validated based on Z. Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item -
7
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…The photographs were processed and georeferenced using an Agisoft PhotoScan algorithm and ten of established ground control points, respectively. …”
Get full text
Get full text
Thesis -
8
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
10
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The method consists of two main stages; the process to distinguish children from adult based on input facial image and the process to verify children age range. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
13
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter -
14
Enhanced face recognition using discrete cosine transform
Published 2016“…In signal processing, important information is mainly required and processed. …”
Get full text
Get full text
Get full text
Article -
15
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
Get full text
Get full text
Thesis -
16
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
17
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The results involve the verification of the proposed method and mathematical example using three (3) prime numbers. …”
Get full text
Get full text
Student Project -
18
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. These sites are in the Peninsular of Malaysia. …”
Get full text
Get full text
Thesis -
19
-
20
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article
