Search Results - (( verification implementation based algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- verification implementation »
- implementation based »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
-
5
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. …”
Get full text
Get full text
Monograph -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
7
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
8
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
11
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
Get full text
Get full text
Thesis -
12
-
13
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
14
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…However, most person recognition systems are implemented based on unimodal biometrics such as face recognition or voice recognition. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
17
Development of biosignals-based multimodal biometric system
Published 2014“…ECG Identification (ECGI) on the other hand provides an accuracy of 98. 7% and ECG Verification (ECGV) EER of 4.2%. In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
Get full text
Get full text
Get full text
Thesis -
18
Bit-error rate performance analysis of spectrum based detector for FSK digital modulation
Published 2003“…FSK is widely used digital modulation technique due to its simplicity in implementation using noncoherent detection. Further availability of digital signal processing algorithms such as the FFT (Fast Fourier Transform) and necessary supporting technology makes it possible to implement spectrum based deteetor for FSK. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Face recognition for identify verification in exams locations
Published 2023“…It also needs to be fast for quick verification. The project uses a mix of hardware and software tools. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…The testing reported in this paper has been carried out on signature samples of 100 users which contain both their genuine as well as their skilled and random forged signature samples counterparts. The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
Article
