Search Results - (( using identification matching algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fingerprint Image Compression Using Wavelet Transform by Hanashi, Abdalla Musbah

    Published 2003
    “…It means that there exists a large selection of wavelet families depending on choice of wavelet function. The objective of this study is to evaluate a variety of wavelet filters using Wavelet toolbox for selecting the best wavelet filters to be used in compress and decompress of selected fingerprint images. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…In this paper, we present an implementation of a security system based on voice identification as the access control key. Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…For minutiae matching, the matching algorithm has been developed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Identification of power poles based on satellite stereo images using graph-cut algorithm by Qayyum, Abdul, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Ahmad, Rana Fayyaz, Taun Abdullah, Taun Ab Rashid

    Published 2015
    “…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Identification of power poles based on satellite stereo images using graph-cut algorithm by Qayyum, A., Malik, A.S., Saad, M.N.M., Ahmad, R.F., Abdullah, A.R.T.

    Published 2015
    “…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION by ALEX, NG HO LIAN

    Published 2020
    “…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Person identification in irregular cardiac conditions using electrocardiogram signals by Sidek, Khairul Azami, Khalil, Ibrahim

    Published 2011
    “…Cross correlation (CC) was used as the biometric matching algorithm with defined threshold values to evaluate the performance. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  17. 17

    Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis by Adnani, Seyedeh Atena

    Published 2011
    “…In this system,similar insolvent system, three methods including one variable at a time, Taguchi method and ANN were used for optimization and prediction of percentage of conversion. …”
    Get full text
    Get full text
    Thesis
  18. 18

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation by Moh'd Radwan, Eyad Moh'd

    Published 2004
    “…A simple yet effective rotor time constant identification method is presented and used for updating the slip calculator used by the IRFOC algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An efficient method of biometric matching using interpolated ECG data by Sidek, Khairul Azami, Sufi, Fahim, Khalil, Ibrahim, Al-Shammary, Dhiah

    Published 2010
    “…In this paper, a person identification method using electrocardiogram (ECG) is presented based on cubic spline interpolation method. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper