Search Results - (( using function sensor algorithm ) OR ( using verification using algorithm ))
Search alternatives:
- using verification »
- verification using »
- sensor algorithm »
- using algorithm »
- using function »
-
1
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
2
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. …”
Get full text
Get full text
Article -
3
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
Article -
4
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
5
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
6
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
8
Provisioning an energy efficient with maximum coverage WSN through biological inspired sensor node placement
Published 2023Conference Paper -
9
Energy efficient sensor nodes placement using Territorial Predator Scent Marking Algorithm (TPSMA)
Published 2023“…The TPSMA deployed in this paper uses the maximum coverage ratio as the objective function. …”
Conference paper -
10
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
Get full text
Get full text
Get full text
Article -
11
Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm
Published 2023“…The algorithm uses the maximum coverage and minimum energy consumption objective functions with subject to full connectivity. …”
Article -
12
Stroke-to-stroke matching in on-line signature verification
Published 2010“…The output of this research project is an algorithm that can be used to map strokes as well as to compare similarity of strokes in on-line signature.…”
Get full text
Get full text
Thesis -
13
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
Get full text
Get full text
Article -
15
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
16
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
17
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA)
Published 2023“…The TPSMA deployed in this paper uses the minimum uncovered area as the objective function. …”
Conference paper -
19
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…In view of this, current tactile sensors cannot be used in endoscopic inspection applications. …”
Get full text
Get full text
Thesis -
20
Analysis of energy consumption in a wireless sensor network using fuzzy memberships function
Published 2020“…The use of sensors in every application as well as in today's life has become a huge demand. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
