Search Results - (( using verification using algorithm ) OR ( basic visualization tools algorithm ))

Refine Results
  1. 1

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Bottleneck-based heuristic for permutation flowshop scheduling by Isa, Noor Amira

    Published 2017
    “…A total 1000 set random processing time for each job sizes was tested using Excel simple programming with built in Visual Basic for Application (VBA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  4. 4

    VISUAL MOUSE (COLOR TRACKING) by BAHRUDIN, MUHAMMADMUSTAFA

    Published 2007
    “…This project will deal with algorithm and tools in MATLAB software as its medium. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification by Chan, Ying Hui, Abu Bakar, Syed Abdul Rahman

    Published 2005
    “…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…The output of this research project is an algorithm that can be used to map strokes as well as to compare similarity of strokes in on-line signature.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Biometric signature verification using pen position, time, velocity and pressure parameters by Mailah, Musa, Lim, Boon Han

    Published 2008
    “…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fast clock tree generation using exact zero skew clock routing algorithm by Reaz, Mamun Ibn, Ibrahimy, Muhammad Ibn, Amin, Nowshad

    Published 2009
    “…A few Perl scripts and a new visual basic based routing tool have been developed to support the methodology implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…This article starts by introducing the basic sensor systems and analyzing the evolution of monocular tracking and mapping algorithms through bibliometric data. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item