Search Results - (( using identification matching algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- identification matching »
- using identification »
- application testing »
- testing algorithm »
- java application »
-
1
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2023Conference Paper -
3
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
4
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation. …”
Get full text
Get full text
Conference or Workshop Item -
5
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Person identification in irregular cardiac conditions using electrocardiogram signals
Published 2011“…Cross correlation (CC) was used as the biometric matching algorithm with defined threshold values to evaluate the performance. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
10
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Plants identification has become a significant and incentive research area. …”
Get full text
Get full text
Thesis -
11
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
13
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
14
An efficient method of biometric matching using interpolated ECG data
Published 2010“…In this paper, a person identification method using electrocardiogram (ECG) is presented based on cubic spline interpolation method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
17
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
Face verification : an introduction
Published 2011Get full text
Get full text
Get full text
Book Chapter
