Search Results - (( developing world verification algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…Face recognition is one of the most important and rapidly advanced active research areas of computer science.In spite of the large number of developed algorithms, real-world performance of face recognition has been disappointing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
    Get full text
    Get full text
    Get full text
    Book
  10. 10

    Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection by Wong, Shu Jie

    Published 2023
    “…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Local and global measures for measuring performance of big data analytics process by Ali, Ismail Mohamed

    Published 2019
    “…More has been written about the quality of big data, its dimensions and algorithms applied on data to solve complex problems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…In the same vein, almost all of the known authentication techniques rely on the single gateway node, which is unsuitable for the current sensor nodes that are broadly distributed in the real world. Despite technological advances, resource constraints and vulnerability to an attacker physically capturing some sensor nodes have remained an important and challenging research field for developing wireless sensor network user authentication. …”
    Get full text
    Get full text
    Get full text
    Article