Search Results - (( using function using algorithm ) OR ( user verification using algorithm ))
Search alternatives:
- verification using »
- user verification »
- using algorithm »
- using function »
-
1
An enhanced fingerprint template protection scheme
Published 2022“…Therefore, this study aims to enhance the existing schemes by using chaos-based encryption and hash functions to meet the specified properties by securing users’ fingerprint templates (FT) within the embedded systems. …”
Get full text
Get full text
Thesis -
2
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
3
User authentication using neural network in smart home
Published 2009“…The network which gives the better performance network is used to develop the user authentication system.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…A web-based traffic management system was developed using open source software in this study. Verification of the shortest path calculation result obtained from the traffic management system was done via comparison of the performance and result with the use of Quantum GIS (QGIS) software and Waze application. …”
Get full text
Get full text
Thesis -
5
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
6
-
7
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…The abil ity to respond to spoken language is of special importance in computer application wherein the user cannot use his/her limbs in a proper way, and may be useful in office automation systems. …”
Get full text
Get full text
Thesis -
8
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
Get full text
Get full text
Get full text
Thesis -
9
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…User then able to pay parking fees by using mobile phone through android application linked with user’s number plate. …”
Get full text
Get full text
Final Year Project -
10
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
11
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
Get full text
Get full text
Get full text
Article -
12
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…An algorithm is used to check and analyze the validity and functionality of each layer. …”
Get full text
Get full text
Get full text
Article -
13
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. …”
Get full text
Get full text
Article -
14
Oral Dictionary
Published 2006“…Procedures to obtain the result of the system effectiveness are discussed in this paper, where product evaluation I testing is conducted to two groups of users and the result on searching time comparison, misrecognition rate, verification on British-English standard, system functionality and overall system interface design are discussed in detail throughout this paper.…”
Get full text
Get full text
Final Year Project -
15
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…The handwritten signals have been captured and digitized using a tablet. The main features of the proposed signature verification system are the dynamically update of handwritten signature, retries capability in verification, application of tolerance bands and threshold values, development of user friendly Graphic User Interface, application of Common Time Axes and verification of signatures using a class of a multilayer feed-forward neural network. …”
Get full text
Get full text
Article -
16
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
17
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Further revisions will aim on improving the lack of multilingual algorithms and broadening the database to make the app accessible to users worldwide. …”
Get full text
Get full text
Student Project -
18
-
19
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…The design using Simulink and System generator can greatly reduce the process cycle from the algorithm to hardware. …”
Get full text
Get full text
Thesis -
20
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…The ‘symmetric key algorithm’ was used to build up the keys for every registered user. …”
Get full text
Get full text
Get full text
Book Section
