Search Results - (( user verification method algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- verification method »
- user verification »
- method algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
3
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
Get full text
Get full text
Thesis -
4
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
6
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
7
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…Furthermore, an offline authentication phase uses the OTP algorithm to authenticate registered users even if the connectivity services are unavailable. …”
Get full text
Get full text
Article -
8
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
9
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
Get full text
Get full text
Get full text
Article -
10
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
Get full text
Get full text
Thesis -
11
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
13
Bundle Sorting Mobile Application
Published 2020“…The purpose of the articles and reports is to establish IT solutions to improve the counting method of clothing production quality. It also offers insight into the method and process of improved surveillance of clothing in the fabric production line via an image processing algorithm that reduces the uncertainty workflow throughout actual clothing storage and conversion of clothing details into quantity. …”
Get full text
Get full text
Final Year Project -
14
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…Hence, in this research has been proposed a hybrid structure of Dynamic AES (DAES) and Blowfish algorithms. This procedure specifies the security of uploaded file on the cloud with a strong encryption method and also the privacy and reliability of submitted information of a user with considering performance of speed.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman
Published 2024“…The prediction tool utilises an Artificial Neural Network (ANN) with a two-layer feed-forward algorithm and ten hidden layers, using Levenberg-Marquardt as the training algorithm. …”
Get full text
Get full text
Thesis -
16
Speaker recognition using neural network
Published 2012“…Speaker recognizer may be employed as part of a security system requiring user authentication. Mostly, years by years there have been several techniques being developed to achieve high success rate of accuracy in the identification and verification of individuals for authentication in security systems. …”
Get full text
Get full text
Undergraduates Project Papers -
17
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…Dynamic characterisations of one-dimensional flexible beam and two-dimensional flexible plate structures are presented and simulation algorithms characterising the behaviour of each structure is developed using finite difference methods. …”
Get full text
Get full text
Get full text
Thesis -
18
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…An algorithm is used to check and analyze the validity and functionality of each layer. …”
Get full text
Get full text
Get full text
Article -
19
A comparative evaluation on data transformation approach for artificial speech detection
Published 2024“…The rise of voice biometrics has transformed user authentication and offered enhanced security and convenience while phasing out less secure methods. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
