Search Results - (( verification implementation developing algorithm ) OR ( java implementation re algorithm ))

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Face recognition for identify verification in exams locations by Ng, Suet Eng

    Published 2023
    “…Hardware includes cameras and laptops, meanwhile software tools include PyCharm Community, OpenCV and the Haar-Cascade Algorithm are used for development. By implementing this facial recognition system, candidates would need to identify their identity before entering exam centres, as it is to reducing cheating and impersonation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology by Bakri N.B., Ahmad S.M.S., Shakil A.

    Published 2023
    “…The testing reported in this paper has been carried out on signature samples of 100 users which contain both their genuine as well as their skilled and random forged signature samples counterparts. The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
    Article
  10. 10

    Design of a floating point unit for 32-bit 5 stage pipeline processor by Low, Wai Hau

    Published 2020
    “…The development project will start by studying the algorithm of addition on floating point numbers. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…Therefore, the multimodal biometric system based on face and fingerprint recognition is developed in this paper. First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Standalone PV solar using LED flood light for street lighting by Amedan, Rubiatul Adawiah

    Published 2017
    “…The hardware process of this project is implemented by using Arduino, for verification of the results. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The process of development and implementation of DIS is carried out using MATLAB software and the image of the surface topography is then analysed to retrieve the results. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
    Get full text
    Get full text
    Thesis