Search Results - (( iris implementation using algorithm ) OR ( java application based algorithm ))
Search alternatives:
- implementation using »
- iris implementation »
- application based »
- java application »
- using algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. …”
Get full text
Get full text
Final Year Project -
3
Iris Recognition As Biometric Authentication
Published 2016“…Biometric authentication system utilises the behavioural and physical traits to identify individuals. In this project, an iris recognition technique based on the John Daugman’s algorithm is used. …”
Get full text
Get full text
Final Year Project -
4
Development of Real-Time Eye Tracking Algorithm
Published 2021“…The eye tracking algorithm is implemented in OpenCV using Python Software for ease of portability. …”
Get full text
Get full text
Conference or Workshop Item -
5
A New Model of Securing Iris Authentication Using Steganography
Published 2011Get full text
Get full text
Article -
6
Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System
Published 2012“…Here, iris segmentation has been implemented using Hough Transform and Integro-Differential Operator techniques. …”
Get full text
Get full text
Article -
7
Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System
Published 2012“…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
Get full text
Get full text
Get full text
Article -
8
Hardware prototyping of Iris recognition system: A neural network approach
Published 2007“…Image processing involves histogram stress, thresholding, cropping, transformation and normalizing that is performed by using Matlab. Multilayer perceptron architecture with backpropagation algorithm is employed to recognize iris pattern. …”
Get full text
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The segmentation iris is transformed to rectangular shape using the Rubber Sheet method. …”
Get full text
Get full text
Thesis -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
13
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
14
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
An implementation of regional descriptor and line roi in development of semi-automated strabismus detection system
Published 2022“…In feature extraction, binarization and morphological operations are implemented to identify the location of the iris and the misalignment measurement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
