Search Results - (( pre implementation matching algorithm ) OR ( java simulation optimisation algorithm ))
Search alternatives:
- implementation matching »
- simulation optimisation »
- optimisation algorithm »
- pre implementation »
- java simulation »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Performance evaluation of automatic number plate recognition on android smartphone platform
Published 2017“…On the other hand, the traditional algorithm using template matching only obtained 83.7% recognition rate with 0.98 second processing time. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Embedded car plate image recognition system
Published 2008“…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
Get full text
Learning Object -
5
Face Detection System / Chan Beh Teng
Published 2004“…After that, the system will locate the frontal human face(s) within the skin regions, using template matching. The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
6
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
Get full text
Get full text
Thesis -
7
Image enhancement and segmentation on simultaneous latent fingerprint detection
Published 2015“…To verify the capability of the proposed segmentation algorithm, the segmentation results is evaluated in two aspects: a comparison with the ground truth foreground and matching performance based on segmented region. …”
Get full text
Get full text
Thesis -
8
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Development of biosignals-based multimodal biometric system
Published 2014“…The success of any biometric system is dependent on the pre-processing, features and classification algorithms exploits. …”
Get full text
Get full text
Get full text
Thesis -
10
Segmentation Word to Improve Performance Sentiment Analysis for Indonesian Language
Published 2024“…This study explores the enhancement of accuracy in Indonesian sentiment analysis by incorporating text segmentation features during the pre-processing phase. One of the most important steps in creating a highquality Bag of Words is to separate Indonesian sentences with no spacing, which is made possible by the created text segmentation algorithm. …”
Get full text
Get full text
Get full text
Article -
11
A study on component-based technology for development of complex bioinformatics software
Published 2004“…As known by them, GOA is an ongoing process and protein normally executes a variety of functions in different processes, so with the implementation of PFP(), they have increased the chances of finding matching function annotation for the first rule in the filtration process as much as 20%. …”
Get full text
Get full text
Monograph -
12
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
13
Computed tomography and echocardiography image fusion technique for cardiac images
Published 2016“…Also, different performance metrics are implemented to examine the performance of the proposed fusion system. …”
Get full text
Get full text
Get full text
Thesis
