Search Results - (( using function sensor algorithm ) OR ( based verification method algorithm ))

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Energy efficient sensor nodes placement using Territorial Predator Scent Marking Algorithm (TPSMA) by Abidin H.Z., Din N.M.

    Published 2023
    “…The TPSMA deployed in this paper uses the maximum coverage ratio as the objective function. …”
    Conference paper
  7. 7
  8. 8

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm by Zainol Abidin H., Din N.M., Yassin I.M., Omar H.A., Radzi N.A.M., Sadon S.K.

    Published 2023
    “…The algorithm uses the maximum coverage and minimum energy consumption objective functions with subject to full connectivity. …”
    Article
  10. 10

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun by Koh , Che Hun

    Published 2019
    “…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  16. 16

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA) by Abidin H.Z., Din N.M.

    Published 2023
    “…The TPSMA deployed in this paper uses the minimum uncovered area as the objective function. …”
    Conference paper
  19. 19

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…In view of this, current tactile sensors cannot be used in endoscopic inspection applications. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Analysis of energy consumption in a wireless sensor network using fuzzy memberships function by Wan Isni Sofiah, Wan Din, Ramalingam, Mritha, Nuramera, Abdullah

    Published 2020
    “…The use of sensors in every application as well as in today's life has become a huge demand. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item