Search Results - (( iris implementation success algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- iris implementation »
- implication based »
- java implication »
-
1
Hardware prototyping of Iris recognition system: A neural network approach
Published 2007“…Multilayer perceptron architecture with backpropagation algorithm is employed to recognize iris pattern. The entire architecture was modeled using VHDL, a hardware description language. …”
Get full text
Get full text
Get full text
Article -
2
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
3
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
4
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
5
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
6
An implementation of regional descriptor and line roi in development of semi-automated strabismus detection system
Published 2022“…In feature extraction, binarization and morphological operations are implemented to identify the location of the iris and the misalignment measurement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…In conclusion, this project was a success and satisfied all scopes required.…”
Get full text
Get full text
Thesis -
8
-
9
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
