Search Results - (( its verification based algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- verification based »
- its verification »
- java application »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
7
-
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
9
-
10
-
11
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
12
-
13
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking about its behaviour. …”
Short Survey -
14
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…The Halal Product Checker: Real-Time Ingredient Verification Application Using Text Scanning is an OCR (Optical Character Recognition) technology-based mobile application created to assist Muslims in ascertaining whether the ingredients in foods are halal. …”
Get full text
Get full text
Student Project -
15
Finger vein verification
Published 2009“…This trait offers a higher security because for gery is extremely difficult. The finger vein verification project verifies a person‟s identity based on the vein patterns. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
-
17
-
18
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
19
-
20
