Search Results - (( using verification using algorithm ) OR ( data optimization method algorithm ))
Search alternatives:
- using verification »
- verification using »
- data optimization »
- method algorithm »
- using algorithm »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
2
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
3
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
4
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…Five phases—Data User (DS) authentication, sensitivity-aware request scheduling, policy verification, trust management, and optimal CSP selection—are proposed. …”
Get full text
Get full text
Get full text
Article -
5
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
Get full text
Get full text
Thesis -
6
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
7
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
10
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
12
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
Get full text
Get full text
Get full text
Article -
13
Stroke-to-stroke matching in on-line signature verification
Published 2010“…The output of this research project is an algorithm that can be used to map strokes as well as to compare similarity of strokes in on-line signature.…”
Get full text
Get full text
Thesis -
14
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
Get full text
Get full text
Article -
15
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
16
Modelling and calibration of high-pressure direct injection compressed natural gas engine
Published 2021“…A proper setting for the MBC procedure using the Genetic Algorithm (GA) needs to be identified. …”
Get full text
Get full text
Thesis -
17
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
20
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis
