Search Results - (( java simulation optimisation algorithm ) OR ( using verification matching algorithm ))
Search alternatives:
- simulation optimisation »
- optimisation algorithm »
- verification matching »
- using verification »
- java simulation »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
4
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Face verification : an introduction
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
7
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
8
Partial fingerprint recognition using support vector machine
Published 2010“…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
Get full text
Get full text
Get full text
Article -
9
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
12
-
13
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
Get full text
Get full text
Thesis -
14
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
Get full text
Get full text
Get full text
Thesis -
15
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
16
-
17
Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System
Published 2012“…Then the image captured is segmented and normalized for encoding process. The matching technique, Hamming Distance, is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage. …”
Get full text
Get full text
Article -
18
A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing
Published 2024“…The SIFT algorithm has some drawbacks and is currently widely used because of its overall efficiency, although the efficiency of a single collection is slow. …”
Conference Paper -
19
Development of biosignals-based multimodal biometric system
Published 2014“…Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
Get full text
Get full text
Get full text
Thesis -
20
Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System
Published 2012“…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
Get full text
Get full text
Get full text
Article
