Search Results - (( java application using algorithm ) OR ( based verification matching algorithm ))
Search alternatives:
- verification matching »
- based verification »
- java application »
- using algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
3
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
5
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…Next, two features are fused by using match score level fusion based on Weighted Sum-Rule. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Partial fingerprint recognition using support vector machine
Published 2010“…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
Get full text
Get full text
Get full text
Article -
7
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
8
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Banking on this, region labeling assigns the labels of either background or foreground region based on a proposed graph coloring algorithm, which considers trajectory-based features. …”
Get full text
Get full text
Get full text
Thesis -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
-
13
-
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Fuzzy logic based mppt control for a thermoelectric generator system
Published 2022“…In addition, a boost converter having a Fuzzy Logic Controller (FLC) based MPPT algorithm was added to the TEG modeling. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Development of biosignals-based multimodal biometric system
Published 2014“…This thesis also implements a new technique based on the fiducial points of the ECG, which results in significant improvement performance for biometric matching. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing
Published 2024“…Experimental results show that the algorithm achieves good results in fingerprint processing, both fast and accurate. � 2023 IEEE.…”
Conference Paper -
20
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis
