Search Results - (( user verification based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- verification based »
- user verification »
- testing algorithm »
- java application »
-
1
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
2
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Further revisions will aim on improving the lack of multilingual algorithms and broadening the database to make the app accessible to users worldwide. …”
Get full text
Get full text
Student Project -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
5
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
6
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
7
Contactless palmprint verification using siamese networks
Published 2022“…Biometric based identification technology can be seen taking multiple forms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
9
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…If the fusion score is less than the threshold level, then the verification process indicates a mismatch. The result of accuracy will not be displayed if the user selects different biometric characteristics for both recognition.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
Article -
13
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
Get full text
Get full text
Article -
14
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
Get full text
Get full text
Thesis -
15
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…This quadcopter uses an algorithm to remotely and autonomously measure the methane gas concentrations in user defined areas at landfill sites. …”
Get full text
Get full text
Thesis -
16
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…Furthermore, an offline authentication phase uses the OTP algorithm to authenticate registered users even if the connectivity services are unavailable. …”
Get full text
Get full text
Article -
17
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
19
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…User will be notified by receiving an email, while the report current and past track can be viewed via web based visualization interface with Google Map as base map. …”
Get full text
Get full text
Thesis -
20
