Search Results - (( verification implementation level algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification implementation »
- implementation level »
- implication based »
- java implication »
- level algorithm »
-
1
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
Get full text
Get full text
Final Year Project -
2
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. The addition algorithm is then implemented in the FPU so that the FPU can perform addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Development of biosignals-based multimodal biometric system
Published 2014“…ECG Identification (ECGI) on the other hand provides an accuracy of 98. 7% and ECG Verification (ECGV) EER of 4.2%. In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
Get full text
Get full text
Get full text
Thesis -
4
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. Next, two features are fused by using match score level fusion based on Weighted Sum-Rule. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
6
-
7
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The methodology of this research are involving design specification, high level design using C++, RTL level description using Verilog, functional verification and logic synthesis using two different technology library. …”
Get full text
Get full text
Research Report -
8
An enhanced intelligent database engine by neural network and data mining
Published 2000“…The second problem is tackled by implementing two strengthening procedures, confidence and Bayes verification to filter out the unpredictive rules. …”
Get full text
Get full text
Article -
9
-
10
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The result of the studies proved that higher number of particles used in the algorithm for position reconstruction gives more accuracy and we found that the Sc-46 obtain more accurate calculation and shows low statistical level than Au-198 particle. …”
Get full text
Get full text
Get full text
Article -
11
Active intelligent control of vibration of flexible plate structures
Published 2011“…It is shown that higher levels of vibration can be achieved with model-based SIMO-AVC algorithms as compared to those model- based SISO-AVC algorithms. …”
Get full text
Get full text
Thesis -
12
Case driven TLC model checker analysis in energy scenario
Published 2023“…Moreover, the outcomes of formal techniques and tools application directly depend on specification atomicity level chosen – as a tradeoff between the complexity of program- algorithmic constituent addressed to be represented in formal specification and available computational and spatial resources of the computing platform with model checking technique implementation – because of an exponential growth of transition system state space. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…One way to tackle this problem is by adding another level of the Wi-Fi security protection. We proposed to blend the ‘captive portal’ strategy with ‘key verification’ techniques in order to improve the security system in Wi-Fi. …”
Get full text
Get full text
Get full text
Book Section -
14
Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin
Published 2023“…Finally, to compare the strength of the security level of the proposed method with the other digital signature. …”
Get full text
Get full text
Student Project -
15
Modeling And Simulation Of Microcode Memory Built-in Self Test Architecture For Embedded Memories
Published 2007“…Five BIST algorithms are implemented i.e MATS, MATS+, MARCH X, MARCH C and March C- to test the faulty SRAM. …”
Get full text
Get full text
Conference or Workshop Item -
16
A Web Based System For Evaluating Occupational Stress
Published 2007“…Five BIST algorithms are implemented i.e MATS, MATS+, MARCH X, MARCH C and March C-to test the faulty SRAM…”
Get full text
Get full text
Get full text
Article -
17
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
Get full text
Get full text
Thesis -
18
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
Get full text
Get full text
Article -
19
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. When evaluated with BAN-Logic, ProVerif, and AVISPA, PRESENT is secured against known attacks such as MITM, password guessing, privilege insider, and impersonation attacks. …”
Get full text
Get full text
Get full text
Thesis -
20
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
