Search Results - (( develop bring function algorithm ) OR ( java identification system algorithm ))
Search alternatives:
- identification system »
- java identification »
- function algorithm »
- system algorithm »
- bring function »
- develop bring »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
4
Development of a scalable video compression algorithm
Published 2012“…The choice of a scalable video coding framework in this context brings technical and economical advantages. The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Design and development of an intelligent battery charger station
Published 2009“…The fast charge cycle bring the battery to approximately 90% of the full charge condition. …”
Get full text
Get full text
Monograph -
6
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011“…Bee-Inspired algorithms were presumed to bring the new direction in the field of Swann Intelligence. …”
Get full text
Get full text
Final Year Project -
7
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
Get full text
Get full text
Thesis -
8
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…This thesis introduces an innovative signal detector algorithm in facilitating the cognitive radio functionality for the new IEEE 802.22 Wireless Regional Area Networks (WRAN) standard. …”
Get full text
Get full text
Get full text
Thesis -
9
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
Get full text
Get full text
Thesis -
12
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The separation of control functionality from forwarding devices brings orchestration and management to enable 5G network programmability. …”
Get full text
Get full text
Thesis -
13
Scentopia: Navigating the World of Fragrance
Published 2024“…This research presents a comparative analysis that emphasises the unique qualities of Scentopia above other platforms in the market, highlighting its large database size, sophisticated recommendation algorithm, and high degree of personalisation. The research also looks into potential future projects, such as adding a visual search function, bringing the application to Android and other platforms, allowing for ongoing user feedback, and doing routine maintenance and updates. …”
Get full text
Get full text
Final Year Project -
14
Internet access using encrypted membercard / Muhammad Syafiq Sopian
Published 2021“…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. …”
Get full text
Get full text
Student Project -
15
Android Ransomware Detection Based on Dynamic Obtained Features
Published 2024journal::journal article -
16
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
Get full text
Get full text
Thesis -
17
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
18
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…The predominant philosophy behind Hadoop optimization is the optimization of MapReduce, which is a dominant programming platform effective in bringing a=bout many functional enhancements as per scheduling algorithms developed and implemented. …”
Get full text
Get full text
Get full text
Article -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
20
The behavior of MENA oil and non-oil producing countries in international portfolio optimization
Published 2010“…It is well documented in developed economies that portfolio investment across national borders brings benefits of increasing returns and/or reducing risk. …”
Get full text
Get full text
Article
