Search Results - (( using identification matching algorithm ) OR ( java application based algorithm ))
Search alternatives:
- identification matching »
- using identification »
- application based »
- java application »
-
1
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
2
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2023Conference Paper -
4
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
5
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation. …”
Get full text
Get full text
Conference or Workshop Item -
6
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Person identification in irregular cardiac conditions using electrocardiogram signals
Published 2011“…Cross correlation (CC) was used as the biometric matching algorithm with defined threshold values to evaluate the performance. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
10
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Plants identification has become a significant and incentive research area. …”
Get full text
Get full text
Thesis -
12
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
14
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
15
An efficient method of biometric matching using interpolated ECG data
Published 2010“…In this paper, a person identification method using electrocardiogram (ECG) is presented based on cubic spline interpolation method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
17
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
Get full text
Get full text
Get full text
Get full text
Proceedings
