Search Results - (( developing program drops algorithm ) OR ( java identification method algorithm ))
Search alternatives:
- identification method »
- java identification »
- developing program »
- method algorithm »
- program drops »
-
1
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Congestion management based optimization technique using bee colony
Published 2023“…The study involved the development of bee colony algorithm in addressing congestion management, considering cost optimization as the objective function. …”
Conference Paper -
3
Simulation of single and dual layered rapid pressure swing adsorption
Published 2013“…A dual layered RPSA model is then developed. Verification of the applied numerical methods and computer programs are carried out successfully that the simulated results agree well with the analytical solutions and experimental data. …”
Get full text
Get full text
Thesis -
4
-
5
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
Get full text
Get full text
Monograph -
6
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…Tube B images are needed to evaluate the performance of the developed defect detection algorithm under different radiography conditions. …”
Get full text
Monograph -
7
-
8
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Automatic mapping of concrete strength in structural element
Published 2006“…The mapping process is done automatically in computer-generated program. Signal-processing techniques were used to compute the data; Fourier Transform to translate a time-series signal into frequency domain, concrete strength calculation, interpolation technique and a Graphic User Interface (GUI) to complete the mapping algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
10
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…These existing schemes, however, rely on different types of cryptographic methods that usually have high computation complexity. …”
Get full text
Get full text
Thesis
