Search Results - (( using verification using algorithm ) OR ( basic application system algorithm ))
Search alternatives:
- using verification »
- verification using »
- basic application »
- system algorithm »
- using algorithm »
-
1
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Speech emotion verification system (SEVS) based on MFCC for real time applications
Published 2008“…Experimental results show potential of using these techniques to detect and distinguish three basic emotions from speech for real-time applications based on features extracted using MFCC.…”
Get full text
Get full text
Get full text
Proceeding Paper -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
4
Bundle Sorting Mobile Application
Published 2020“…The worker or user just used the camera that has an image processing algorithm to do the sorting. …”
Get full text
Get full text
Final Year Project -
5
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…The system able to recognize characters on number plate by using Automatic Number Plate Recognition (ANPR) technology which implement optical character recognition (OCR) algorithm to process the characters from images. …”
Get full text
Get full text
Final Year Project -
6
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
7
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
8
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
Get full text
Get full text
Thesis -
9
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
10
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…An algorithm was used to verify filetypes by looking up a File Signature library to compare files’ header with their extension. …”
Get full text
Get full text
Thesis -
11
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
Get full text
Get full text
Get full text
Article -
12
Stroke-to-stroke matching in on-line signature verification
Published 2010“…The output of this research project is an algorithm that can be used to map strokes as well as to compare similarity of strokes in on-line signature.…”
Get full text
Get full text
Thesis -
13
Biometric signature verification using pen position, time, velocity and pressure parameters
Published 2008“…A novel algorithm has been applied that provides the ability to produce consistent and high accuracy verification result and maintain the speed of verification. …”
Get full text
Get full text
Article -
14
-
15
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
16
Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model
Published 2000“…The system of nonlinear equations was solved using successive substitutions employing Thomas algorithm and Gaussian elimination. …”
Get full text
Get full text
Thesis -
17
-
18
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
19
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
20
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). …”
Get full text
Get full text
Thesis
