Search Results - (( iris implementation based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- implementation based »
- iris implementation »
- java application »
-
1
Iris Recognition As Biometric Authentication
Published 2016“…In this project, the proposed iris recognition technique will be based on the John Daugman’s algorithm. …”
Get full text
Get full text
Final Year Project -
2
Development of Real-Time Eye Tracking Algorithm
Published 2021“…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Hardware prototyping of Iris recognition system: A neural network approach
Published 2007“…A novel hardware-based iris recognition system is proposed in this paper, which consists of two main parts: image processing and recognition. …”
Get full text
Get full text
Get full text
Article -
4
Embedded system for biometric identification based on iris detection
Published 2009Get full text
Article -
5
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
An improved pheromone-based kohonen self-organising map in clustering and visualising balanced and imbalanced datasets
Published 2021“…Therefore, this research proposed an improved pheromone- based PKSOM algorithm known as iPKSOM to solve the mentioned problem. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
11
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
12
-
13
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
