Search Results - (( developing world verification algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification algorithm »
- world verification »
- implication based »
- developing world »
- java implication »
-
1
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…Face recognition is one of the most important and rapidly advanced active research areas of computer science.In spite of the large number of developed algorithms, real-world performance of face recognition has been disappointing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
Fingerprint frontier: the evolution of biometric security
Published 2023“…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
Get full text
Get full text
Get full text
Book -
10
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
Published 2023“…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Local and global measures for measuring performance of big data analytics process
Published 2019“…More has been written about the quality of big data, its dimensions and algorithms applied on data to solve complex problems. …”
Get full text
Get full text
Thesis -
12
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…In the same vein, almost all of the known authentication techniques rely on the single gateway node, which is unsuitable for the current sensor nodes that are broadly distributed in the real world. Despite technological advances, resource constraints and vulnerability to an attacker physically capturing some sensor nodes have remained an important and challenging research field for developing wireless sensor network user authentication. …”
Get full text
Get full text
Get full text
Article
