Search
Now showing items 5541-5550 of 11883
Comprehensive review of cybercrime detection techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ...
Ultra-Low Energy CNFET-Based Ternary Combinational Circuits Designs
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The embedded systems, IoT (Internet of Things) devices, and portable electronic devices spread very quickly recently. Most of them depend on batteries to operate. The target of this work is to decrease energy consumption ...
Influence of codebook patterns on writer recognition: An experimental study
(
Blackwell Publishing Ltd
, 2021 , Article)
Codebook-based writer characterization is an effective technique that has been investigated in a number of recent studies on identification and verification of writers. These methods divide a set of writing samples into ...
Enhancing face recognition using Directional Filter Banks
(
Elsevier Inc.
, 2013 , Article)
Face recognition is an increasingly important problem in biometric applications; consequently many recognition algorithms have been proposed during the last three decades. It is accepted that the use of a pre-processing ...
DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In this paper, we propose a robust face recognition model called DeepWTPCA-L1 using WTPCA-L1 features and a CNN-LSTM architecture. First, WTPCA-L1 algorithm, composed of Three-level decomposition of discrete wavelet transform ...
Historical documents dating using multispectral imaging and ordinal classification
(
Elsevier Masson s.r.l.
, 2020 , Article)
The estimation of the age of undated old manuscripts is one of the most challenging and controversial tasks in the field of historical document analysis. Several dating methods have been proposed, but most of them either ...
A comprehensive overview of feature representation for biometric recognition
(
Springer
, 2020 , Article)
The performance of any biometric recognition system heavily dependents on finding a good and suitable feature representation space where observations from different classes are well separated. Unfortunately, finding this ...
Increase the Efficiency of IoT Devices by Using the Wireless Power Transmission in the Industrial Revolution 4.0
(
International Association of Online Engineering
, 2021 , Article)
Today's world is evolving toward creating a smart house where a multitude of Internet of Things (IoT) devices and sensors are interacting to deliver plenty of useful information. Essential to the implementation of this IoT ...
COVID-19 lesion segmentation using lung CT scan images: Comparative study based on active contour models
(
MDPI
, 2021 , Article)
Pneumonia is a lung infection that threatens all age groups. In this paper, we use CT scans to investigate the effectiveness of active contour models (ACMs) for segmentation of pneumonia caused by the Coronavirus disease ...
Text-dependent writer identification for arabic handwriting
(
Hindawi Publishing Corporation
, 2012 , Article)
This paper proposes a system for text-dependent writer identification based on Arabic handwriting. First, a database of words was assembled and used as a test base. Next, features vectors were extracted from writers' word ...