Search Results - ((iris code) OR (ips code))

Search alternatives:

Refine Results
  1. 1

    Design Of Protected Iris Recognition Systems With Improved Authentication Performance by Chai, Tong Yuen

    Published 2022
    “…Next, focus has been put on the security concern caused by the iris code’s alignment process during matching. This process can only be conducted on probe iris codes for most of the protected iris recognition systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB) by Hashim, Nurul Akmal

    Published 2017
    “…Iris identification is an automatic system to recognise an individual in biometric applications.Human iris is an internal organ that can be accessed from external view of the body.Moreover,the structure of the iris is formed in a complete random manner and has unique features such as crypts,furrows,collarets,pupil,freckles, and blotches.In fact, no iris patterns are the same.The iris structure is stable which it means the location of the iris features is permanent at certain point.Nevertheless,the shape of iris features changes slowly due to several factors which include aging,surgery,growth,emotion and dietary habits. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A New Model of Securing Iris Authentication Using Steganography by Zainal Abidin, Zaheera, Manaf, Mazani, Shibghatullah, Abdul Samad

    Published 2011
    “…Here, the stego key, n, will be inserted into the binary values from the plane which concealed the information; where n is the input parameter in binary values which inserted to the iris codes, m. These values produce the output which is the new iris stego image after binary conversion. …”
    Get full text
    Get full text
    Article
  5. 5

    Access Windows by Iris Recognition by Ali, Musab A. M

    Published 2009
    “…MATLAB ver. 7.0 is used to preprocess the taken images convert the images into code and compare the picture code with the stored database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Iris recognition system by using support vector machines by Ali, Hasimah, Salami, Momoh Jimoh Eyiomika, Martono, Wahyudi

    Published 2008
    “…In this paper, the CASIA iris database is used for individual user’s verification by using support vector machines (SVMs) which based on the analysis of iris code as feature extraction is discussed. …”
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System by Zainal Abidin, Zaheera, -, M.Manaf, Shibghatullah, Abdul Samad, -, S.H.A.Mohd Yunos, -, S.Anawar, -, Z.Ayop

    Published 2012
    “…The matching technique, Hamming Distance, is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage. …”
    Get full text
    Get full text
    Article
  9. 9

    Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System by Zainal Abidin, Zaheera, Anawar, Syarulnaziah, Ayop, Zakiah, Manaf, Mazani, Shibghatullah, A.S., Mohd Yunos, S.H.A.

    Published 2012
    “…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Iris recognition system using support vector machines by Ali, Hasimah, Salami, Momoh Jimoh Emiyoka

    Published 2011
    “…In this paper, the CASIA iris database is used for individual user’s verification by using support vector machines (SVMs) which based on the analysis of iris code as feature extraction is discussed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…Instead of processing a whole or half size of an iris image, the 480 code size which is equivalent to the quarter size of an iris is selected due to its outstandingly accurate results and less computational complexity. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Design of iris mechanism for flexion and extension training in hand rehabilitation by Ali, Muhammad Aminuddin Anwar, Zainul Azlan, Norsinnira

    Published 2016
    “…This paper presents the design and development of a new hand rehabilitation device based on iris mechanism with basic Arduino coding to train the flexion and extension of the hand. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Investigation on anonymous email in online social networking / Fatma Husna M Mazlin by M Mazlin, Fatma Husna

    Published 2016
    “…The information that will be received after tracing the anonymous email are information of country name, region name, city, longitude, latitude, country code and postal code of the IP address. At the end of the project, this IP address location tracker system expected to assist the forensic analysts to find the evidence of digital forensic for anonymous email.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…The DSCP resides inside the Differentiated Services (DS) field of the Internet Protocol (IP) packet header in an OSI or TCP/IP model, which prioritizes different types of packets for forwarding to the router based on the attached payload. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Legal aspect of land criminal investigation: some observation by Nazli, Ismail@Nawang, Noraida, Harun, Mohd Helmi, Mat Zin

    Published 2020
    “…However, the requirement of preparing an Investigation Paper (IP) is entirely new in the Malaysian Land Administration as it has only become mandatory with the coming into force of the National Land Code (Amendment) 2008 in January 2009. …”
    Get full text
    Get full text
    Article
  18. 18

    Embedded TCP/IP in sensor nodes (sensornets) by Mat Jubadi, Warsuzarina

    Published 2005
    “…These constraints have been considered too limiting for physical size sensor to be able to use the TCP/IP protocols. This project was carried out to develop two sensor nodes that able to sense the temperature value, to embed the TCP/IP stack into the sensor nodes, and to apply the SLIP protocol into the TCP/IP stack. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Investigating latency in two ways communication of VOIP in WLAN by Idris, Fakrulradzi, Syed Ariffin, Sharifah Hafizah

    Published 2009
    “…There are numerous method proposed to improve the performance of real time application such as VoIP during handoff. One of the methods is Mobile IP, which provides mobility management in the network layer of TCP/IP protocol. …”
    Get full text
    Get full text
    Monograph