Search Results - (( using function using algorithm ) OR ( user verification using algorithm ))

Refine Results
  1. 1

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Therefore, this study aims to enhance the existing schemes by using chaos-based encryption and hash functions to meet the specified properties by securing users’ fingerprint templates (FT) within the embedded systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Passwords are frequently used to control access to restricted functions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…The network which gives the better performance network is used to develop the user authentication system.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…A web-based traffic management system was developed using open source software in this study. Verification of the shortest path calculation result obtained from the traffic management system was done via comparison of the performance and result with the use of Quantum GIS (QGIS) software and Waze application. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…The abil ity to respond to spoken language is of special importance in computer application wherein the user cannot use his/her limbs in a proper way, and may be useful in office automation systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    AUTO-MANAGE PARKING SYSTEM (AMPS) by KHAIRUDDIN, MUHAMMAD AMIRUL SYAFIQ

    Published 2019
    “…User then able to pay parking fees by using mobile phone through android application linked with user’s number plate. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Oral Dictionary by Md. Radzi, Ashylla

    Published 2006
    “…Procedures to obtain the result of the system effectiveness are discussed in this paper, where product evaluation I testing is conducted to two groups of users and the result on searching time comparison, misrecognition rate, verification on British-English standard, system functionality and overall system interface design are discussed in detail throughout this paper.…”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Biometric signature verification using pen position, time, velocity and pressure parameters by Mailah, Musa, Lim, Boon Han

    Published 2008
    “…The handwritten signals have been captured and digitized using a tablet. The main features of the proposed signature verification system are the dynamically update of handwritten signature, retries capability in verification, application of tolerance bands and threshold values, development of user friendly Graphic User Interface, application of Common Time Axes and verification of signatures using a class of a multilayer feed-forward neural network. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Halal product checker: real time ingredient verification application using mobile text scanning by Abd Rahim, Adam Putra

    Published 2025
    “…Further revisions will aim on improving the lack of multilingual algorithms and broadening the database to make the app accessible to users worldwide. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…The design using Simulink and System generator can greatly reduce the process cycle from the algorithm to hardware. …”
    Get full text
    Get full text
    Thesis
  20. 20