Search Results - (( using equalization based algorithm ) OR ( using verification using algorithm ))

Refine Results
  1. 1

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…MATLAB Simulink and System Generator are the tools used for the prototyping. The design using Simulink and System generator can greatly reduce the process cycle from the algorithm to hardware. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…Experimental results show that the recognition rate for the Heart Sound Identification (HSI) model is 81.9%, while the rate for the Speaker Identification (SI) model is 99.3% for 20 clients. Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Design Rule Check To Validate Option Metal And Via For A Preprogrammed Layout Design by Oothayer Kumar, Sureindra Kumar

    Published 2014
    “…However, the conventional verification using the design rule check (DRC) in Cadence does not include the check for option layer. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification by Chan, Ying Hui, Abu Bakar, Syed Abdul Rahman

    Published 2005
    “…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…The output of this research project is an algorithm that can be used to map strokes as well as to compare similarity of strokes in on-line signature.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Biometric signature verification using pen position, time, velocity and pressure parameters by Mailah, Musa, Lim, Boon Han

    Published 2008
    “…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20