Search Results - (( java application interface algorithm ) OR ( user verification system algorithm ))
Search alternatives:
- verification system »
- user verification »
- java application »
- system algorithm »
-
1
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…The main features of the proposed signature verification system are the dynamically update of handwritten signature, retries capability in verification, application of tolerance bands and threshold values, development of user friendly Graphic User Interface, application of Common Time Axes and verification of signatures using a class of a multilayer feed-forward neural network. …”
Get full text
Get full text
Article -
2
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
3
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Completion of the application has been achieved and System Usability Scale (SUS) testing indicated high user satisfaction. …”
Get full text
Get full text
Student Project -
4
-
5
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…After users complete the registration, the Interface System should require them to apply for a verification key. …”
Get full text
Get full text
Get full text
Book Section -
6
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…The design using Simulink and System generator can greatly reduce the process cycle from the algorithm to hardware. …”
Get full text
Get full text
Thesis -
7
An enhanced fingerprint template protection scheme
Published 2022“…However, as many users frequently assess the systems, fingerprints could be replicated and modified by attackers. …”
Get full text
Get full text
Thesis -
8
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
10
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
11
Contactless palmprint verification using siamese networks
Published 2022“…In view of the current situation, this project aims to implement a contactless palmprint recognition system as a means to authenticate users in a more hygienic way. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
User authentication using neural network in smart home
Published 2009“…The network which gives the better performance network is used to develop the user authentication system.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…If the fusion score is higher than the threshold level is given, then the verification process is matched. The result of accuracy is displayed if the user selects the same biometric characteristics for both recognition. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
Article -
16
Experimental Verification of Vehicle-to-Grid Charger for Demand Response Service
Published 2023Conference Paper -
17
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Higher security systems have now veered towards biometric verification in conjunction with passwords. …”
Get full text
Get full text
Thesis -
18
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
Get full text
Get full text
Article
