Search Results - (( problem based verification algorithm ) OR ( java simulation optimisation algorithm ))
Search alternatives:
- simulation optimisation »
- verification algorithm »
- optimisation algorithm »
- based verification »
- java simulation »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
3
-
4
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
7
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Users reported an enhancement in their confidence to make halal food choices, with speedier decisions and accurate real-time verification. Results confirmed the app’s effectiveness in streamlining the halal verification process, solving problems such as ambiguous ingredient lists and the absence of real-time verification tools in other systems. …”
Get full text
Get full text
Student Project -
8
Enhancement of simultaneous network reconfiguration and DG sizing via Hamming dataset approach and firefly algorithm
Published 2019“…DNR is a complex combinatorial problem which requires radiality verification. Implicit radiality verification increases computational overhead and may lead to local optima. …”
Get full text
Get full text
Article -
9
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
Get full text
Get full text
Article -
10
A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem
Published 2020“…The current paper presents a neural network-based hybrid strategy that combines a Genetic Algorithm (GA) and a Dual Recurrent Neural Network (DRNN) for efficiently and accurately solving the quadratic-Bi-level Programming Problem (BLPP). …”
Get full text
Get full text
Article -
11
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…In this paper, a simple and effectiveness algorithm is proposed for fingerprint image recognition and the proposed algorithm is able to solve the problem discussed above. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
12
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
13
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
Get full text
Get full text
Conference or Workshop Item -
14
Development of biosignals-based multimodal biometric system
Published 2014“…The best performance of the work is based on simple-sum score fusion with a piecewiselinear normalization technique which provides an EER of 0. 7%.…”
Get full text
Get full text
Get full text
Thesis -
15
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
16
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The messages will be in form of numbers, which will allow us to have verification of the sender and receiver. The mathematics concept that will be used is prime factorization and discrete logarithm problem. …”
Get full text
Get full text
Student Project -
17
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
18
Using Bimodal Gaussian Mixture Model-Based Algorithm for Background Segmentation in Thermal Fever Mass Screening
Published 2011“…In this paper, an algorithm based on Gaussian Bi -modal Mixture Models (GBMM) is proposed for background-foreground segmentation as an important feature to identify medial canthal area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Unfortunately, password or personal identification number (PIN) verification suffers an inherent problem. It cannot ensure that the user is the claimed individual. …”
Get full text
Get full text
Thesis
