Search Results - (( user verification using algorithm ) OR ( basic classification problems algorithm ))
Search alternatives:
- basic classification »
- verification using »
- user verification »
- using algorithm »
- problems »
-
1
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…The handwritten signals have been captured and digitized using a tablet. The main features of the proposed signature verification system are the dynamically update of handwritten signature, retries capability in verification, application of tolerance bands and threshold values, development of user friendly Graphic User Interface, application of Common Time Axes and verification of signatures using a class of a multilayer feed-forward neural network. …”
Get full text
Get full text
Article -
2
Text classification using Naive Bayes: An experiment to conference paper
Published 2005“…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
4
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Further revisions will aim on improving the lack of multilingual algorithms and broadening the database to make the app accessible to users worldwide. …”
Get full text
Get full text
Student Project -
5
-
6
-
7
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. …”
Get full text
Get full text
Thesis -
8
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…The design using Simulink and System generator can greatly reduce the process cycle from the algorithm to hardware. …”
Get full text
Get full text
Thesis -
9
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…The ‘symmetric key algorithm’ was used to build up the keys for every registered user. …”
Get full text
Get full text
Get full text
Book Section -
10
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
11
Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021
Published 2022“…The complex nature of the brain tissue makes the problem of locating, segmenting, and ultimately classifying Magnetic Resonance (MR) images a complex problem. …”
Get full text
Get full text
Get full text
Article -
12
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
Get full text
Get full text
Article -
13
User authentication using neural network in smart home
Published 2009“…The network which gives the better performance network is used to develop the user authentication system.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This reserarch adapted a methodology of computer vision and algorithms that exploit image segmentation, feature extraction and fuzzy classification to guide the research activities. …”
Get full text
Get full text
Thesis -
15
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The sample participants highly accept it for future use in the user acceptance test.…”
Get full text
Get full text
Get full text
Article -
16
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…Bat algorithm is chosen for the development of the prototype for segmentation and classification purpose. …”
Get full text
Get full text
Thesis -
17
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
Get full text
Get full text
Thesis -
18
Contactless palmprint verification using siamese networks
Published 2022“…The four main stages are – Palmprint Image Input, Region of interest segmentation, Feature extraction and Verification. The novelties of this project are the algorithm used to segment the feature abundant region of interest from the palm image, and also the usage of a custom-built Siamese Network utilising a state-of-the-art CNN called EfficientNet as the underlying feature extractor. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
20
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The two approaches were applied to image pattern recognition problems. The RSNN was applied to automatic target recognition problem. …”
Get full text
Get full text
Thesis
