Search Results - (( verification implementation method algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Realization of a Hybrid Locally Connected Extreme Learning Machine with DeepID for Face Verification by Wong S.Y., Yap K.S., Zhai Q., Li X.

    Published 2023
    “…Backpropagation algorithms; Computation theory; Deep learning; Face recognition; Iterative methods; Knowledge acquisition; Machine learning; Neural networks; Biological learning; Convolutional neural network; DeepID; Extreme learning machine; Face Verification; Fast implementation; Feature mapping; Labeled faces in the wilds (LFW); Learning algorithms…”
    Article
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The results involve the verification of the proposed method and mathematical example using three (3) prime numbers. …”
    Get full text
    Get full text
    Student Project
  5. 5

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…Using this approach, experimental result provides, Total Success Rate (TSR) is 98.79%, False Acceptance Rate (FAR) is 3.21% and False Rejection Rate (FRR) is 0%. Since the proposed method requires very small computational time, the practical implementation requirement for a large number of person verification is possible.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…Thus a new technique is implemented in this paper in order to reduce the time consuming faced by the existing method. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…In this paper, a finger vein recognition method has been implemented in which the effect on performance has of using principal components analysis has been investigated. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…The project’s purpose is to enhance the tracking method of garments’ quantity by implementing image processing in the mobile application. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market by Pourdaryaei, Alireza, Mokhlis, Hazlie, Illias, Hazlee Azil, Kaboli, S. Hr. Aghay, Ahmad, Shameem, Ang, Swee Peng

    Published 2019
    “…Actual data sets are collected from Ontario electricity market of the year 2017 for the verification of simulation results. Finally, the simulation results validated the premise of the proposed hybrid method through enhanced accuracy compared to the results acquired by implementing hybrid support vector machine (SVM) and hybrid ANN optimization methods. © 2013 IEEE.…”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Noise removal methodologies for lung cancer diagnosis by Nur Fatin Razlieya, Mohd Razali

    Published 2019
    “…The development research methodology presented five fundamental stage which are investigation of existing method of noise removal, developing a new method for noise removal, implementation of the noise removal method, verification and validation. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers