Search Results - (( java application server algorithm ) OR ( using verification matching algorithm ))
Search alternatives:
- verification matching »
- application server »
- using verification »
- java application »
- server algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
4
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
5
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Face verification : an introduction
Published 2011Get full text
Get full text
Get full text
Book Chapter -
7
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
8
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Partial fingerprint recognition using support vector machine
Published 2010“…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
Get full text
Get full text
Get full text
Article -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
13
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
15
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
19
-
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis
