Search Results - (( java application path algorithm ) OR ( data verification matching algorithm ))
Search alternatives:
- verification matching »
- data verification »
- java application »
- application path »
- path algorithm »
-
1
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
2
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
4
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The lowest biometric errors of false non-match rate and false match rate are decreased to about 6.19% and 1.79%, respectively on the KPCA data set.…”
Get full text
Get full text
Thesis -
6
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
Get full text
Get full text
Thesis -
7
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
8
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Then, instead of pair-wise spatial matching as with image registration, correspondences between video frames are discovered through multigraph matching of robust spatio-temporal features of each region. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing
Published 2024“…Experimental results show that the algorithm achieves good results in fingerprint processing, both fast and accurate. � 2023 IEEE.…”
Conference Paper -
12
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…In this paper, a simple and effectiveness algorithm is proposed for fingerprint image recognition and the proposed algorithm is able to solve the problem discussed above. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
Fuzzy logic based mppt control for a thermoelectric generator system
Published 2022“…In addition, a boost converter having a Fuzzy Logic Controller (FLC) based MPPT algorithm was added to the TEG modeling. After the TEG output equations were determined, the TEG modeling was performed based on manufacturer data sheets. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Human Spontaneous Emotion Detection System
Published 2018“…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Fingerprint image segmentation using hierarchical technique
Published 2000“…The quality or the fingerprint image is the most significant (actor in a reliable matching process. Thus, any pre-processing algorithm should aim to enhance the quality of the existing features without creating false features [I). …”
Get full text
Get full text
Conference or Workshop Item -
16
Oral Dictionary
Published 2006“…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
Get full text
Get full text
Final Year Project -
17
Quarantine order violators system using Face Recognition (FACID) / Yamunnawahthi Somasundharam, Suraya Abu Bakar and Syifak Izhar Hisham
Published 2024“…Face recognition technology is commonly utilized for user authentication and verification by analysing a digital image of a person's face and matching it against a database of faces for identification purposes. …”
Get full text
Get full text
Get full text
Article -
18
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
Get full text
Get full text
Get full text
Article
