Search Results - (( verification implementation level algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Design of a floating point unit for 32-bit 5 stage pipeline processor by Low, Wai Hau

    Published 2020
    “…The development project will start by studying the algorithm of addition on floating point numbers. The addition algorithm is then implemented in the FPU so that the FPU can perform addition on floating point numbers. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…ECG Identification (ECGI) on the other hand provides an accuracy of 98. 7% and ECG Verification (ECGV) EER of 4.2%. In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. Next, two features are fused by using match score level fusion based on Weighted Sum-Rule. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results by Fouziah Md Yassin, Ag Asri Ag Ibrahim, Zaturrawiah Ali Omar, Saturi Baco

    Published 2015
    “…The methodology of this research are involving design specification, high level design using C++, RTL level description using Verilog, functional verification and logic synthesis using two different technology library. …”
    Get full text
    Get full text
    Research Report
  8. 8

    An enhanced intelligent database engine by neural network and data mining by Chua, Boon Lay, Khalid, Marzuki, Yusof, Rubiyah

    Published 2000
    “…The second problem is tackled by implementing two strengthening procedures, confidence and Bayes verification to filter out the unpredictive rules. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The result of the studies proved that higher number of particles used in the algorithm for position reconstruction gives more accuracy and we found that the Sc-46 obtain more accurate calculation and shows low statistical level than Au-198 particle. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…It is shown that higher levels of vibration can be achieved with model-based SIMO-AVC algorithms as compared to those model- based SISO-AVC algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…Moreover, the outcomes of formal techniques and tools application directly depend on specification atomicity level chosen – as a tradeoff between the complexity of program- algorithmic constituent addressed to be represented in formal specification and available computational and spatial resources of the computing platform with model checking technique implementation – because of an exponential growth of transition system state space. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a... by Abdul Basit, Kamarul Ariffin, Awang, Norkhushaini, Darus, Mohammad Yusof, Mohd Ali, Fakariah Hani

    Published 2014
    “…One way to tackle this problem is by adding another level of the Wi-Fi security protection. We proposed to blend the ‘captive portal’ strategy with ‘key verification’ techniques in order to improve the security system in Wi-Fi. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin by Yahya, Nurzhulaika, Agil, Noor Izzah, Nordin, Nur ‘Afini

    Published 2023
    “…Finally, to compare the strength of the security level of the proposed method with the other digital signature. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Modeling And Simulation Of Microcode Memory Built-in Self Test Architecture For Embedded Memories by Haron, Nor Zaidi, Md Junos@Yunus, Siti Aisah, Abdul Aziz, Amir Shah

    Published 2007
    “…Five BIST algorithms are implemented i.e MATS, MATS+, MARCH X, MARCH C and March C- to test the faulty SRAM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Web Based System For Evaluating Occupational Stress by Haron, Nor Zaidi, Siti Aisah , Mat Junos @ Yunus, Abdul Aziz, Amir Shah

    Published 2007
    “…Five BIST algorithms are implemented i.e MATS, MATS+, MARCH X, MARCH C and March C-to test the faulty SRAM…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Muda, A. K., Khadijah Wan, Mohd Ghazali

    Published 2013
    “…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
    Get full text
    Get full text
    Article
  19. 19

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. When evaluated with BAN-Logic, ProVerif, and AVISPA, PRESENT is secured against known attacks such as MITM, password guessing, privilege insider, and impersonation attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20