Search Results - (( using rectification using algorithm ) OR ( java identification system algorithm ))
Search alternatives:
- identification system »
- using rectification »
- rectification using »
- java identification »
- system algorithm »
- using algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
4
Graph-based conflict rectification using stroke gesture approach in timetabling system (CORECTS)
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Boundary of interested area can be acquired using a predefined algorithm or define by user using interactive drawing. …”
Get full text
Get full text
Thesis -
6
OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING
Published 2009“…Abstract This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
Get full text
Get full text
Citation Index Journal -
7
OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING
Published 2009“…This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
Get full text
Get full text
Citation Index Journal -
8
A Practical Method for Camera Calibration in Stereo Vision Mobile Robot Navigation
Published 2012“…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Pixel to Pixel Correspondence and Region of Interest in Stereo Vision Application
Published 2012“…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Simulation and design of A DC-DC synchronous converter by intelligent optimization techniques
Published 2010“…The design and analysis of the converter with the Genetic Algorithm are performed using software tools within the MATLAB/ SIMULINK environment. …”
Get full text
Get full text
Conference or Workshop Item -
11
An Analysis Of Multiple Size Region Of Interest In Disparity Mapping For Stereo Vision Application
Published 2011“…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
Get full text
Get full text
Conference or Workshop Item -
12
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
Get full text
Get full text
Thesis -
13
A Pixel Matching Process And Multiples Roi For Stereo Images In Stereo Vision Application
Published 2011“…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Biceps brachii surface EMG classification using neural networks
Published 2012“…The acquisition module is used to acquire EMG signals from the subject. Several signal processing methods are carried out in the preprocessing module, where the EMG signal will undergo a series of processes like filtering, rectification and integration. …”
Get full text
Thesis -
16
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
Get full text
Get full text
Thesis -
18
Investigation of impedance-based fault location techniques in power system network / Tan Feng Jie
Published 2019“…The estimated fault distances are evaluated using relative error based on total line length to determine the accuracy. …”
Get full text
Get full text
Get full text
Thesis -
19
Safety Analysis Of Unsignalized Intersections Under Erroneous Road Crash Data Influence
Published 2016“…As a result of the rectification process, which involved the use of Nested Filtered Search Algorithm (NFSA) to match the accidents with the intersections where they might have occurred, 16 sites were correctly identified that initiated the second phase of the study. …”
Get full text
Get full text
Thesis -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis
