Search Results - (( verification implementation developing algorithm ) OR ( java implementation new algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  11. 11

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  12. 12

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Face recognition for identify verification in exams locations by Ng, Suet Eng

    Published 2023
    “…Hardware includes cameras and laptops, meanwhile software tools include PyCharm Community, OpenCV and the Haar-Cascade Algorithm are used for development. By implementing this facial recognition system, candidates would need to identify their identity before entering exam centres, as it is to reducing cheating and impersonation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology by Bakri N.B., Ahmad S.M.S., Shakil A.

    Published 2023
    “…The testing reported in this paper has been carried out on signature samples of 100 users which contain both their genuine as well as their skilled and random forged signature samples counterparts. The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
    Article
  15. 15

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Design of a floating point unit for 32-bit 5 stage pipeline processor by Low, Wai Hau

    Published 2020
    “…The development project will start by studying the algorithm of addition on floating point numbers. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…Therefore, the multimodal biometric system based on face and fingerprint recognition is developed in this paper. First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Standalone PV solar using LED flood light for street lighting by Amedan, Rubiatul Adawiah

    Published 2017
    “…The hardware process of this project is implemented by using Arduino, for verification of the results. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis