Search Results - (( using verification matching algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION by ALEX, NG HO LIAN

    Published 2020
    “…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5
  6. 6

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Partial fingerprint recognition using support vector machine by Vijayaprasad, Perumal, Sulaiman, Md. Nasir, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System by Zainal Abidin, Zaheera, -, M.Manaf, Shibghatullah, Abdul Samad, -, S.H.A.Mohd Yunos, -, S.Anawar, -, Z.Ayop

    Published 2012
    “…Then the image captured is segmented and normalized for encoding process. The matching technique, Hamming Distance, is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage. …”
    Get full text
    Get full text
    Article
  20. 20

    A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing by Hamzah N.A., Jaaz Z.A., Al-Bakri N.F., Tawfeq J.F., Radhi A.D.

    Published 2024
    “…The SIFT algorithm has some drawbacks and is currently widely used because of its overall efficiency, although the efficiency of a single collection is slow. …”
    Conference Paper