Search Results - (( java identification system algorithm ) OR ( program validating based algorithm ))
Search alternatives:
- identification system »
- java identification »
- system algorithm »
- validating based »
-
1
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
3
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…A matheuristic approach based on a reduced two-stage Stochastic Integer Linear Programming (SILP) model is presented. …”
Get full text
Get full text
Article -
8
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
9
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
10
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In addition, two novel Jaya-based methods namely, the modified Jaya (MJaya) algorithm and quasi-oppositional modified Jaya (QOMJaya) algorithm are proposed to solve different MOOPF problems. …”
Get full text
Get full text
Thesis -
11
-
12
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
13
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019Get full text
Get full text
Thesis -
14
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
Get full text
Get full text
Thesis -
15
Euclidean space data projection classifier with cartesian genetic programming (CGP)
Published 2018“…This research work is a preliminary work which proposes an evolutionary-based classifier using a simplified Cartesian Genetic Programming (CGP) evolutionary algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
17
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
18
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Get full text
Article -
19
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
20
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article
