2017 International Conference on Computational Science and Computational Intelligence (CSCI) 2017
DOI: 10.1109/csci.2017.96
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Student Attendance System Using Iris Biometric Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 3 publications
0
28
0
Order By: Relevance
“…Where, N, in this instance, is the sums of iteration,f_i is the training loss values and y_i is the testing loss values. Consequently, MSE is calculated, as presented in (2) [36], [37].…”
Section: Mean Squared Errormentioning
confidence: 99%
“…Where, N, in this instance, is the sums of iteration,f_i is the training loss values and y_i is the testing loss values. Consequently, MSE is calculated, as presented in (2) [36], [37].…”
Section: Mean Squared Errormentioning
confidence: 99%
“…This is because control may not be total especially in risk management processes such as change management where process failure is possible. Detective control is therefore required to identify errors, irregularities or attacks after their occurrences [10,29]. Botnet detection can be classified by botmasters, bots or C&C servers.…”
Section: Detectionmentioning
confidence: 99%
“…How a botnet work [7] Prior to 2013, four primary methods commonly being used to mitigate DDoS attacks were commercial security software, criminal enforcement, botnet seizure by federal agencies, and private civil action [8]. However, such efforts, though valuable, are passive and limited by their focus on prevention [9,10]. A leading cloud based service provider, CloudFlare, therefore offered DDoS protection capable of matching sophisticated DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…A democratic nation is the people's country. Democratic government can only be right when there is provision for a trustworthy and secured electoral process [1]. E-voting is an emerging technology that has improved the traditional method of voting [2].…”
Section: Introductionmentioning
confidence: 99%