Search Results - (( using function method algorithm ) OR ( based verification system algorithm ))
Search alternatives:
- verification system »
- based verification »
- method algorithm »
- system algorithm »
- function method »
- using function »
-
1
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
2
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
3
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…It will include the coding of python programming coding and calculation of proposed method. The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
4
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
5
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The second controller design strategy is based on a cost function optimization using GAS. …”
Get full text
Get full text
Get full text
Thesis -
6
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
7
User authentication using neural network in smart home
Published 2009“…In this project, a neural network is trained to store the passwords and replace verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
9
A comparative study of vibrational response based impact force localization and quantification using different types of neural networks / Wang Yanru
Published 2018“…It may be ore accurate than MLPwhen there are multiple outputs. In addition, ANFIS uses hybrid learning algorithm. It is mixed with least mean square and gradient descent method, which cause many advantages, such as much better learning ability and less computational time. …”
Get full text
Get full text
Get full text
Thesis -
10
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Article -
12
Dynamic modelling and control of a flexible manipulator
Published 2003“…System transfer function can be retained in symbolic form using this approach and good approximation of the system transfer function can be obtained. …”
Get full text
Get full text
Get full text
Thesis -
13
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
14
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…Principal Component Analysis (Pca) Is Utilized In This System. The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…RS model using quadratic polynomial function is given as equation (1) below. …”
Get full text
Get full text
Conference or Workshop Item -
17
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
18
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
19
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
20
