Search Results - (( based verification using algorithm ) OR ( java applications optimized algorithm ))
Search alternatives:
- applications optimized »
- optimized algorithm »
- based verification »
- verification using »
- java applications »
- using algorithm »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
5
-
6
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
8
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
10
-
11
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
14
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Face identification and verification using PCA and LDA
Published 2008“…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
Get full text
Get full text
Conference or Workshop Item -
18
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
19
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
20
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter
