Search Results - (( its verification process algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification process »
- process algorithm »
- implication based »
- its verification »
- java implication »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
4
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
-
7
-
8
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Users reported an enhancement in their confidence to make halal food choices, with speedier decisions and accurate real-time verification. Results confirmed the app’s effectiveness in streamlining the halal verification process, solving problems such as ambiguous ingredient lists and the absence of real-time verification tools in other systems. …”
Get full text
Get full text
Student Project -
9
Finger vein verification
Published 2009“…Generally, the finger vein images are pre - processed and a neural network algorithm is developed to verify the finger vein images. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
-
11
Enhanced face recognition using discrete cosine transform
Published 2016“…In signal processing, important information is mainly required and processed. …”
Get full text
Get full text
Get full text
Article -
12
Face verification : an introduction
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
14
-
15
-
16
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
17
A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing
Published 2024“…Experimental results show that the algorithm achieves good results in fingerprint processing, both fast and accurate. � 2023 IEEE.…”
Conference Paper -
18
Fingerprint image segmentation using hierarchical technique
Published 2000“…Fingerprints are the ridge and furrow patterns on the tip or the finger and its verification is an important biometric technique (or personal identification). …”
Get full text
Get full text
Conference or Workshop Item -
19
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
20
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…This update process may cause the algorithm to fall to local optima especially in the cases where there are many competing local optima. …”
Get full text
Get full text
Thesis
