Search Results - (( verification segmentation using algorithm ) OR ( java implementation path algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…The aim of this research is to develop a new approach to map the strokes in both test and reference signatures as well as to verify the originality of the test signatures. Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Besides, from the results of validation of the system algorithm, it is proven that the DIS system algorithm is also suitable to be used on the measured areal surface topography of bumps features to segment and isolate the synthesized edges from its surrounding. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Using Bimodal Gaussian Mixture Model-Based Algorithm for Background Segmentation in Thermal Fever Mass Screening by Siti Sofiah, Mohd Radzi, Kamarul Hawari, Ghazali, Nazriyah, Che Zan, Faradila, Naim

    Published 2011
    “…Twenty image sequences were used in the experiments and the result shown the feasibility of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Contactless palmprint verification using siamese networks by Ng, Jan Hui

    Published 2022
    “…The four main stages are – Palmprint Image Input, Region of interest segmentation, Feature extraction and Verification. The novelties of this project are the algorithm used to segment the feature abundant region of interest from the palm image, and also the usage of a custom-built Siamese Network utilising a state-of-the-art CNN called EfficientNet as the underlying feature extractor. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System by Zainal Abidin, Zaheera, -, M.Manaf, Shibghatullah, Abdul Samad, -, S.H.A.Mohd Yunos, -, S.Anawar, -, Z.Ayop

    Published 2012
    “…Then the image captured is segmented and normalized for encoding process. The matching technique, Hamming Distance, is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System by Zainal Abidin, Zaheera, Anawar, Syarulnaziah, Ayop, Zakiah, Manaf, Mazani, Shibghatullah, A.S., Mohd Yunos, S.H.A.

    Published 2012
    “…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…A dynamic actuator was used to cause damage in the tower segments by applying vibration force. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient iris image thresholding based on binarization threshold in black hole search method by Danlami, Muktar, Ramli, Sofia Najwa, Jemain, Nur Izzah Syahira, Pindar, Zahraddeen, Jamel, Sapiee, Deris, Mustafa Mat

    Published 2018
    “…Several algorithms have been proposed in order to segment the outer and lower boundary of the iris region. …”
    Get full text
    Article
  17. 17

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…MDMRBF has been evaluated against two datasets namely the (i) Defense Advanced Research Projects Agency (DARPA) Video Verification of Identity (VIVID) dataset and (ii) two self-captured videos using a mounted camera on a UAV. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood by Alwadood, Zuraida

    Published 2017
    “…The disruptions can create conflicts in the use of tracks and platforms and further propagate the disruptions throughout the railway system. …”
    Get full text
    Get full text
    Thesis