Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Sim, Hiew Moi"'
Autor:
Sim Hiew Moi, Pang Yee Yong, Rohayanti Hassan, Hishammuddin Asmuni, Radziah Mohamad, Fong Cheng Weng, Shahreen Kasim
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 6, Iss 2-2, Pp 531-539 (2022)
One of the most challenging parts of integrating biometrics and cryptography is the intra variation in acquired identifiers between the same users. Due to noise in the environment or different devices, features of the iris may differ when it is acqui
Externí odkaz:
https://doaj.org/article/f3637907b8ae46289812dd80dc256a99
Publikováno v:
In Expert Systems With Applications 1 September 2014 41(11):5390-5404
Publikováno v:
2021 7th International Conference on Control, Automation and Robotics (ICCAR).
Scheduling is a task of dividing the resources such as human, assets according to the constraint satisfaction, time, and priority. Workforce scheduling is one of the typical problems which involved many constraints and requirement that appear in many
Publikováno v:
MATEC Web of Conferences, Vol 255, p 05002 (2019)
The evolve of neural networks algorithm into deep learning convolutional neural networks seems like the next generation for object detection. This algorithm works has a significantly better accuracy and did not tied to any particular aspect ratio. Li
Autor:
Sim Hiew Moi, Pang Yee Yong
Publikováno v:
2017 3rd International Conference on Control, Automation and Robotics (ICCAR).
Many existing real-world biometric applications are primarily unimodal. However, unimodal biometrics accuracy is often limited due to aging, and variations of interaction between user and sensor. In this paper, we propose a new multimodal authenticat
Publikováno v:
ISBAST
Improving the performance of non-idealistic iris recognition has recently become one of the main focus in iris biometric research. In real-world iris image acquisitions, it is common and unavoidable to capture off-angle iris images. Such off-angle ir
Publikováno v:
2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation.
Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. Among the types of biometric being
Autor:
Nazeema Binti Abdul Rahim, Subariah Ibrahim, Puteh Saad, Sim Hiew Moi, Zalmiyah Zakaria, Pang Li Sim
Publikováno v:
SoCPaR
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris r