Search
Now showing items 21-26 of 26
Face recognition using Eigen-Face implemented on DSP processor
(Universiti Malaysia Perlis (UniMAP), 2014)
Face recognition is the established research area in 2D biometric recognition system and
broadly used in a security system. Face recognition system is a physiological biometric information processing based on the two ...
A new fuzzy based diagnosing system for instantaneous processing 12 lead ECG signal
(Universiti Malaysia Perlis (UniMAP), 2014)
The Electrocardiogram (ECG) signal reflects the performance of the human heart as an
electrical signal. It consists of three main waves (P, QRS complex, and T), and is
recorded by an ECG machine in the form of 12 leads ...
Gait recognition using principle component analysis implemented on DSP Processor
(Universiti Malaysia Perlis (UniMAP), 2014)
This research focus on the development of an automatic human identification system
using gait sequence images. Human identification is widely used in computer vision applications such as surveillance system, criminal ...
Information fusion of face and palm-print multimodal biometric at matching score level
(Universiti Malaysia Perlis (UniMAP), 2014)
Multimodal biometric systems that integrate the biometric traits from several modalities
are able to overcome the limitations of single modal biometrics. Fusing the information at the middle stage by consolidating the ...
Linear antenna array synthesis using the enhanced and hybrid cuckoo search metaheuristic algorithms
(Universiti Malaysia Perlis (UniMAP), 2014)
The antenna geometry synthesis plays an important role to determine the
physical layout of the antenna array, which produces the radiation pattern closest to the actual desired pattern. The synthesis can be realized by ...
A comparative analysis of an OCDMA system based on single Photodiode and spectral direct detection schemes
(Universiti Malaysia Perlis (UniMAP), 2014)
The main advantages for using Optical Code Division Multiple Access (OCDMA) are
the flexibility of an asynchronous access method, increased security and graceful
degradation. Over the last decade, many detection techniques ...