Search Results - (( problem implementation models algorithm ) OR ( using verification using algorithm ))

Refine Results
  1. 1

    Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA by Zahari, Taha, Farzad, Tahriri, Siti Zawiah, Md Dawal

    Published 2014
    “…An improved genetic algorithm called fuzzy adaptive genetic algorithm (FAGA) is proposed in order to solve this optimization model. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…To validate the simulation results, an available dataset from a public datacentre was used. The simulation results were then verified using statistical modelling and t-tests. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Model-free-based single-dimension fuzzy smc design for underactuated quadrotor uav by Abro, G.E.M., Zulkifli, S.A.B.M., Asirvadam, V.S., Ali, Z.A.

    Published 2021
    “…Furthermore, to avoid the problem of gimbal lock, the model is amalgamated with hyperbolic function to resolve the singularity issues dully developed due to Newton Eulerâ��s dynamic modeling. …”
    Get full text
    Get full text
    Article
  9. 9

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Since different materials are used in the current SSI problem constitutive models are employed to capture both the linear and nonlinear interactive behavior of all the materials i.e. concrete, steel, soil and interface element. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…The third problem is that unstable cluster has a short lifetime, which is not useful for driving assistance and route planning applications that require temporal location information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy by Ahmad Tarusan, Siti Azura

    Published 2022
    “…MATLAB/Simulink software is used to simulate the proposed strategies while a complete setup system consists of a DS1104 digital signal processor (DSP)-board (to implement the DTC algorithm), Field-programmable Gate Arrays (FPGA) (to implement the blanking circuit), two-level and five-level (CHB) inverter circuit, gate driver circuit, and a 1.1 kW induction motor with 2 kW DC generator as a load is developed for testing and verification purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification by Chan, Ying Hui, Abu Bakar, Syed Abdul Rahman

    Published 2005
    “…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…The output of this research project is an algorithm that can be used to map strokes as well as to compare similarity of strokes in on-line signature.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Biometric signature verification using pen position, time, velocity and pressure parameters by Mailah, Musa, Lim, Boon Han

    Published 2008
    “…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The Implementation of Genetic Algorithm in Path Optimization by Jumali, Suriana

    Published 2005
    “…In this project, TSP will be used to model and easy visualize the path optimization problem and Genetic Algorithm (GA) was chosen to be implemented in resolving the problem. …”
    Get full text
    Get full text
    Final Year Project