Search Results - (( based verification method algorithm ) OR ( data equalization based algorithm ))

Refine Results
  1. 1
  2. 2

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  13. 13

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  14. 14

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  15. 15

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  16. 16

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The thesis proposes a novel ECG verification technique based on non-fiducial approach which explores waveform itself using kernel methods for feature extraction and classification after preprocessing (denoising ECG signals) one lead ECG signals of 52 subjects. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis