Search Results - (( process verification method algorithm ) OR ( processes equalization based algorithm ))
Search alternatives:
- processes equalization »
- process verification »
- verification method »
- method algorithm »
-
1
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
2
-
3
Design Rule Check To Validate Option Metal And Via For A Preprogrammed Layout Design
Published 2014“…This project will be based on TSMC 20nm process library and the modifications are made to enable the option layer check. …”
Get full text
Get full text
Thesis -
4
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…All the required image processing techniques that make the extraction of the true fingerprint features easier are used: equalization, filtering, binarization and thinning. …”
Get full text
Get full text
Thesis -
5
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
6
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
9
Segmentation of MRI brain images using statistical approaches
Published 2011“…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
Get full text
Get full text
Thesis -
10
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The method consists of two main stages; the process to distinguish children from adult based on input facial image and the process to verify children age range. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Images processed using modified Perona-Malik’s anisotropic diffusion method produces images with less noise compared to probability based thresholding method and histogram equalization method. …”
Get full text
Get full text
Monograph -
13
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
Get full text
Get full text
Thesis -
14
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
15
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
16
Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das
Published 2019“…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
Get full text
Get full text
Get full text
Thesis -
17
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter -
18
Enhanced face recognition using discrete cosine transform
Published 2016“…In signal processing, important information is mainly required and processed. …”
Get full text
Get full text
Get full text
Article -
19
Optimal CC-CV charging of lithium-ion battery for charge equalization controller
Published 2023Conference Paper -
20
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The results involve the verification of the proposed method and mathematical example using three (3) prime numbers. …”
Get full text
Get full text
Student Project
