Search Results - (( java application based algorithm ) OR ( using verification matching algorithm ))

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION by ALEX, NG HO LIAN

    Published 2020
    “…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5
  6. 6

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Partial fingerprint recognition using support vector machine by Vijayaprasad, Perumal, Sulaiman, Md. Nasir, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20