Search Results - (( developing e function algorithm ) OR ( java identification system algorithm ))

Refine Results
  1. 1

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms by Sulaiman, Noorazliza

    Published 2017
    “…The performances of all modified ABC variants and formulated memetic ABC algorithms have been evaluated on 27 benchmark functions. …”
    Get full text
    Get full text
    Thesis
  5. 5

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
    Get full text
    Get full text
    Thesis
  13. 13

    E-Handrawn Calculator by Mohamad, Syamimi

    Published 2008
    “…The purpose of this project is to demonstrate an application of back-propagation network (comparison of training their algorithms and transfer function) in order to developing e-Hand-Drawn Calculator. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16

    Hybrid particle swarm optimization algorithm with fine tuning operators by Murthy, G.R., Arumugam, M.S., Loo, C.K.

    Published 2009
    “…From several comparative analyses, it is clearly seen that the performance of all the three PSO algorithms (pf-PSO, ePSO, and hybrid PSO) is considerably improved with various fine tuning operators and sometimes more competitive than the recently developed PSO algorithms.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…Over the last 30 years, many meta-heuristic algorithms have been developed in the literature including that of Simulated Annealing (SA), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search Algorithm (HS) to name a few. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis