Search Results - (( developing security face algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…Integration of multimodal biometrics is one of the well known techniques for security enhancement. Hence, in this research the integration of car plate and face recognition as security enhancement in private parking area has been developed to ensure the car is driven by the authorized or registered owner. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Face recognition door lock system / Danial Haziq Hakimi Salahuddin by Salahuddin, Danial Haziq Hakimi

    Published 2023
    “…The project aims to develop a secure and convenient door lock system that utilizes face recognition technology. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Microcontroller-based face recognition system with web-based application for car security by Arumugam P., Ker P.J., Tan J.Y., Mani D.

    Published 2023
    “…Hardware and software designs were carried out to develop a car security system using microcontroller-based face recognition system. …”
    Article
  6. 6
  7. 7

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Property premises intruders detection using face recognition method / Joveni Henry by Joveni Henry

    Published 2017
    “…This project will focus mainly on the Viola-Jones algorithm for face and facial parts detection, facial geometry distance measure for feature extraction and Similarity Measure algorithm using the Euclidian Distance to perform face recognition. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…Although, many researches have been dedicated to security testing with attack tree models, test case redundancy using this threat modeling technique has been a major issue faced leading to poor test coverage and expensive security testing exercises. …”
    Get full text
    Get full text
    Article
  12. 12

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modified spectral clustering algorithm for semisupervised face annotation modeling by Sheng, Gao You

    Published 2025
    “…Recent advancements in facial recognition have impacted security, healthcare, and identity verification, with face annotation — labeling facial features for training datasets - being crucial. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Deep Learning Based Face Attributes Recognition by Saidi, Mohamad Hazim

    Published 2018
    “…Face Recognition is a recently developing technology with numerous real life applications. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…In terms of hardware implementation, a microcontroller is chose, and a testing environment is established to explore and enhances security measures. This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…The result shows that the enhanced PRESENT outperformed the original, particularly in terms of the security and computation cost. Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Furthermore,an AANN for power system security assessment was developed for steady state and dynamic security assessments. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…Due to the nature of borderless connection, all parties face huge challenges in providing the best quality of services especially in terms of security. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…This system depends on cloudbased storage, which is Firebase to improve security in a variety of situations. At its center, a Raspberry Pi with a webcam performs face scanning and captures face. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development and analysis of face recognition system on a mobile robot environment / Jit Shen Quah and Mariam Md Ghazaly by Jit, Shen Quah, Md Ghazaly, Mariam

    Published 2018
    “…In today’s society, face recognition technology is widely used and applied in various fields such as biometric identification and security surveillance. …”
    Get full text
    Get full text
    Get full text
    Article