Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 9
Abstract
This paper compares two different techniques of iris recognition and explains the steps of extracting iris from eye image palette formation and conditioning of palette for matching. The focus of the paper is in finding the suitable method for iris recognition on the basis of recognition time, recognition rate, false detection rate, conditioning time, algorithm complexity, bulk detection, database handling. In this paper comparison has been performed two methods feature based and phase based recognition.
Application of Online Intelligent Remote Condition Monitoring Management in Thermal Power Plant Maintenance: Study of ThermPower Plant in Zimbabwe
This research study investigated the application of Online Remote Condition monitoring system at a thermal power plant. Analysis was done on the current maintenance strategy at the plant and attributes of the maintenance...
Low Cost Data Acquisition and Control using Arduino Prototyping Platform and LabVIEW
Low Cost Data Acquisition and Control using Arduino Prototyping Platform and LabVIEW
CAMP: Cloud Assisted Mobile Health Care System with Privacy
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party-s cloud system causes serious concern over data confidentiality....
Effect of Iaa on the Growth, Physiological and Biochemical Characteristics in Catharanthus roseus (L). G. Don.
Plant hormones are signal molecules produced within the plant, and occur in extremely low concentrations among the plants and generally considered to modulate many physiological events in higher plants. An experiment was...
Message Embedding In PNG File Using LSB Steganographic Technique
Many types of Internet-based applications have been used for centuries to be secure important information and data. In some case, the communication is necessary to be secret. Consequently, the security of information has...