Search Results - (( parallel optimization method algorithm ) OR ( iris segmentation using algorithm ))

Refine Results
  1. 1
  2. 2

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…The iris boundary is discovered using the suggested segmentation approach and a computational model of the pixel value. …”
    Get full text
    Get full text
    Article
  3. 3

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…Hough transform method is used in iris segmentation to detect location of iris and pupil region in the image. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Iris segmentation and normalization approach by Shamsi, Mahboubeh, Saad, Puteh, Rasouli, Abdolreza

    Published 2008
    “…The algorithm is tested using iris images from CASIA database and MMU database. …”
    Get full text
    Get full text
    Article
  6. 6

    Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System by Zainal Abidin, Zaheera, Anawar, Syarulnaziah, Ayop, Zakiah, Manaf, Mazani, Shibghatullah, A.S., Mohd Yunos, S.H.A.

    Published 2012
    “…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation by Mat Ibrahim, Masrullizam, Awang Md Isa, Azmi, Darsono, Abd Majid

    Published 2014
    “…Eye closure detection is an important operation prior to carry out the main algorithm such as iris recognition algorithms, and eye tracking algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An efficient iris image thresholding based on binarization threshold in black hole search method by Danlami, Muktar, Ramli, Sofia Najwa, Jemain, Nur Izzah Syahira, Pindar, Zahraddeen, Jamel, Sapiee, Deris, Mustafa Mat

    Published 2018
    “…Several algorithms have been proposed in order to segment the outer and lower boundary of the iris region. …”
    Get full text
    Article
  9. 9

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Performance of the proposed algorithm was tested on Chinese Academy of Sciences Institute of Automation (CASIA) iris image database. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Iris Recognition As Biometric Authentication by Kamaruddin, Muhammad Khairulsyamim

    Published 2016
    “…Biometric authentication system utilises the behavioural and physical traits to identify individuals. In this project, an iris recognition technique based on the John Daugman’s algorithm is used. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    Detection of corneal arcus using rubber sheet and machine learning methods by Ramlee, Ridza Azri

    Published 2019
    “…The segmentation iris is transformed to rectangular shape using the Rubber Sheet method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…Any optimization algorithm is suitable for only a specific domain of optimization problems. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Model of Bayesian tangent eye shape for eye capture by Nsaef, Asama Kuder, Jaafar, Azizah, Sliman, Layth, Sulaiman, Riza, O. K. Rahmat, Rahmita Wirza

    Published 2014
    “…Using the algorithms proposed by J. Daugman, Iris recognition system has significantly improved over the last decade, and it has been used in so many practical applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms by Loo, C.K., Liew, W.S., Seera, M., Lim, Einly

    Published 2015
    “…This was achieved by mitigating convergence in the genetic algorithms by employing a hierarchical parallel architecture. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…Hence, the objectives of this research are new algorithms development significantly for iris segmentation specifically the proposed Fusion of Profile and Mask Technique (FPM) specifically in getting the actual center of the pupil with high level of accuracy prior to iris localization task, followed by a particular enhancement in iris normalization that is the application of quarter size of an iris image (instead of processing a whole or half size of an iris image) and for better precision and faster recognition with the robust Support Vector Machine (SVM) as classifier. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes by Mohammad Sigit Arifianto, Tze, Kenneth Kin Teo, Liau, Chung Fan, Liawas Barukang, Zaturrawiah Ali Omar

    Published 2007
    “…Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
    Get full text
    Get full text
    Research Report
  20. 20

    Improved black-winged kite algorithm and finite element analysis for robot parallel gripper design by Haohao, Ma, As’arry, Azizan, Yanwei, Feng, Lulu, Cheng, Delgoshaei, Aidin, Ismail, Mohd Idris Shah, Ramli, Hafiz Rashidi

    Published 2024
    “…This paper presents a comprehensive study on the design optimization of a robotic gripper, focusing on both the gripper modeling and the optimization of its parallel mechanism structure. …”
    Get full text
    Get full text
    Get full text
    Article