Search Results - (( verification implementation based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- verification implementation »
- customization algorithm »
- implementation based »
- java application »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
-
5
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. …”
Get full text
Get full text
Monograph -
6
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
7
-
8
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
9
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
Get full text
Get full text
Thesis -
10
-
11
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
12
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…However, most person recognition systems are implemented based on unimodal biometrics such as face recognition or voice recognition. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
15
Development of biosignals-based multimodal biometric system
Published 2014“…ECG Identification (ECGI) on the other hand provides an accuracy of 98. 7% and ECG Verification (ECGV) EER of 4.2%. In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
Get full text
Get full text
Get full text
Thesis -
16
Bit-error rate performance analysis of spectrum based detector for FSK digital modulation
Published 2003“…FSK is widely used digital modulation technique due to its simplicity in implementation using noncoherent detection. Further availability of digital signal processing algorithms such as the FFT (Fast Fourier Transform) and necessary supporting technology makes it possible to implement spectrum based deteetor for FSK. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Face recognition for identify verification in exams locations
Published 2023“…It also needs to be fast for quick verification. The project uses a mix of hardware and software tools. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…The testing reported in this paper has been carried out on signature samples of 100 users which contain both their genuine as well as their skilled and random forged signature samples counterparts. The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
Article -
19
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
20
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
Get full text
Get full text
Thesis
