Search Results - (( java application using algorithm ) OR ( user verification method algorithm ))

Refine Results
  1. 1

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
    Get full text
    Get full text
    Thesis
  5. 5

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Furthermore, an offline authentication phase uses the OTP algorithm to authenticate registered users even if the connectivity services are unavailable. …”
    Get full text
    Get full text
    Article
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis