Search Results - (( development using verification algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- verification algorithm »
- using verification »
- development using »
- java simulation »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
5
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
7
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…The handwritten signals have been captured and digitized using a tablet. The main features of the proposed signature verification system are the dynamically update of handwritten signature, retries capability in verification, application of tolerance bands and threshold values, development of user friendly Graphic User Interface, application of Common Time Axes and verification of signatures using a class of a multilayer feed-forward neural network. …”
Get full text
Get full text
Article -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
11
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Signature verification system using support vector machine
Published 2009“…This paper highlights the development of online signature verification system using Support Vector Machine (SVM) and VBTablet 2.0 to verify the input signature by comparing database. …”
Get full text
Get full text
Conference or Workshop Item -
16
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
17
-
18
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
19
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…This paper addressed some of these issues to bring face recognition more closely to being useful for real-life applications. It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Finger vein verification
Published 2009“…Generally, the finger vein images are pre - processed and a neural network algorithm is developed to verify the finger vein images. …”
Get full text
Get full text
Final Year Project Report / IMRAD
