Search Results - (( developing function using algorithm ) OR ( java identification system algorithm ))
Search alternatives:
- identification system »
- developing function »
- java identification »
- system algorithm »
- using algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…To improve the users’ memorability, the upload background picture function and cued colour scheme were proposed for the BPG system; the grid line scaling function and the loose authentication method were proposed for the enhanced BPG system; and the chronological story-based cued recall technique was proposed for the VIP Pro system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
5
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
Get full text
Get full text
Thesis -
6
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
7
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
8
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
9
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
Get full text
Get full text
Thesis -
10
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
Get full text
Get full text
Thesis -
13
Quantum-Behaved Lightning Search Algorithm to Improve Indirect Field-Oriented Fuzzy-PI Control for im Drive
Published 2023Conference Paper -
14
A video-rate color image segmentation using adaptive and statistical membership function
Published 2010“…In this algorithm, statistical information of regions is used to create fuzzy membership functions in color model components. …”
Get full text
Get full text
Get full text
Article -
15
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021“…In this project an automated exam hall allocation prototype was developed using the genetic algorithm since this algorithm is commonly used to produce high-quality optimization solutions. …”
Get full text
Get full text
Thesis -
16
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
Get full text
Get full text
Thesis -
17
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
18
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. The center of radial basis function neural network and smoothing factor to take a uniform distribution of the random radial basis function artificial neural network will be the focus of this study. …”
Get full text
Get full text
Article -
19
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…The FVSI was used as the objective function for the developed optimisation technique. …”
Get full text
Get full text
Thesis -
20
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
Get full text
Get full text
Conference or Workshop Item
