Search Results for Security systems - Narrowed by: Computer security - Optical pattern recognitionSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dSecurity$002bsystems$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Optical$002bpattern$002brecognition$002509Optical$002bpattern$002brecognition$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-24T05:13:19Z"Notes.Com" berpandukan pengesahan menggunakan teknik fungsi cincangan dan pangkalan data teragihent://SD_ILS/0/SD_ILS:78482024-05-24T05:13:19Z2024-05-24T05:13:19Zby Adly Abd. Rahman<br/>Author Adly Abd. Rahman<br/>Format: Visual Materials<br/>Call Number MFL 12877<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Fundamental steps for fixed-font character recognition in image processing ... [et al.]ent://SD_ILS/0/SD_ILS:130912024-05-24T05:13:19Z2024-05-24T05:13:19Zby Khor, Sock Choo<br/>Author Khor, Sock Choo, Mohamad Azlie Mohamad Yusof, Tan, Yee Fei, Teo, Lu Ling, Thoo, Wei Ping<br/>Format: Visual Materials<br/>Call Number MFL 9464<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>