Search Results - (( iris implementation from algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- iris implementation »
- implementation from »
- java application »
- from algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A New Model of Securing Iris Authentication Using Steganography
Published 2011“…These values produce the output which is the new iris stego image after binary conversion. Theoretically, the proposed model is promising a high security performance implementation in the future.…”
Get full text
Get full text
Article -
3
Spot Filtering Adaptive Thresholding (SFAT) Method for iris pigment spots segmentation approach / Mustafa Man ... [et al.]
Published 2018“…The result achieved from the testing is 37.02% of the accuracy on the segmentation of the iris pigment spots on the iris surface. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System
Published 2012“…Iris recognition systems capture an image from individual eye. …”
Get full text
Get full text
Article -
5
Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System
Published 2012“…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
Get full text
Get full text
Get full text
Article -
6
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
7
An implementation of regional descriptor and line roi in development of semi-automated strabismus detection system
Published 2022“…In feature extraction, binarization and morphological operations are implemented to identify the location of the iris and the misalignment measurement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
10
-
11
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Popular methods of protecting access such as Personal Identification Numbers and smart cards are subject to security risks that result from accidental loss or being stolen. Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
