Search Results - (( user verification using algorithm ) OR ( basic solution using algorithm ))
Search alternatives:
- verification using »
- user verification »
- using algorithm »
- basic solution »
- solution using »
-
1
Bundle Sorting Mobile Application
Published 2020“…There are many advantages when the apparel industry implemented image processing during sorting the garments product to obtain the accurate quantity in the production line. The worker or user just used the camera that has an image processing algorithm to do the sorting. …”
Get full text
Get full text
Final Year Project -
2
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…The handwritten signals have been captured and digitized using a tablet. The main features of the proposed signature verification system are the dynamically update of handwritten signature, retries capability in verification, application of tolerance bands and threshold values, development of user friendly Graphic User Interface, application of Common Time Axes and verification of signatures using a class of a multilayer feed-forward neural network. …”
Get full text
Get full text
Article -
3
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
4
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…Further revisions will aim on improving the lack of multilingual algorithms and broadening the database to make the app accessible to users worldwide. …”
Get full text
Get full text
Student Project -
5
-
6
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…The design using Simulink and System generator can greatly reduce the process cycle from the algorithm to hardware. …”
Get full text
Get full text
Thesis -
7
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…The ‘symmetric key algorithm’ was used to build up the keys for every registered user. …”
Get full text
Get full text
Get full text
Book Section -
8
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
9
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
10
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
Get full text
Get full text
Thesis -
11
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
Get full text
Get full text
Article -
12
User authentication using neural network in smart home
Published 2009“…The network which gives the better performance network is used to develop the user authentication system.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Data Analysis using Particle Swarm Optimization Algorithm
Published 2015Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The sample participants highly accept it for future use in the user acceptance test.…”
Get full text
Get full text
Get full text
Article -
15
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
Get full text
Get full text
Thesis -
16
Contactless palmprint verification using siamese networks
Published 2022“…The four main stages are – Palmprint Image Input, Region of interest segmentation, Feature extraction and Verification. The novelties of this project are the algorithm used to segment the feature abundant region of interest from the palm image, and also the usage of a custom-built Siamese Network utilising a state-of-the-art CNN called EfficientNet as the underlying feature extractor. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
18
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
-
20
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…Unity Engine provide its own pathfinding solution using A* algorithm with Navigation Mesh (NavMesh) map representation. …”
Get full text
Get full text
Thesis
