Search Results - (( program iris based algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- java application »
- program iris »
- iris based »
-
1
-
2
Detecting cholesterol presence using iris recognition algorithm
Published 2010Get full text
Working Paper -
3
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…Based on this idea, the objective of this project is to develop an automated pattern recognition system based on neural network to recognize the pattern of loaded data file. …”
Get full text
Get full text
Research Reports -
4
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Article -
5
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Get full text
Article -
6
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Get full text
Article -
7
Non-Verbal Human-Robot Interaction Using Neural Network for The Application of Service Robot
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Get full text
Article -
8
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Article -
9
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Get full text
Article -
10
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Get full text
Article -
14
NON-VERBAL HUMAN-ROBOT INTERACTION USING NEURAL NETWORK FOR THE APPLICATION OF SERVICE ROBOT
Published 2023“…The face tracking model was trained using a Long Short-Term Memory (LSTM) neural network, which is based on deep learning. Meanwhile, the iris tracking and eye blinking use a mathematical model. …”
Get full text
Get full text
Article -
15
-
16
-
17
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
18
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
19
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
