Search
Now showing items 21-30 of 35
Unsupervised feature selection method for improved human gait recognition
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Gait recognition is an emerging biometric technology which aims to identify people purely through the analysis of the way they walk. The technology has attracted interest as a method of identification because it is ...
Combining Fisher locality preserving projections and passband DCT for efficient palmprint recognition
(
Elsevier B.V.
, 2015 , Article)
In this paper a new graph based approach referred to as Fisher Locality Preserving Projections (FLPP) is proposed for efficient palmprint recognition. The technique employs two graphs with the first being used to characterize ...
Time-frequency image descriptors-based features for EEG epileptic seizure activities detection and classification
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper presents new class of time-frequency (T-F) features for automatic detection and classification of epileptic seizure activities in EEG signals. Most previous methods were based only on signal features derived ...
Automatic prediction of age, gender, and nationality in offline handwriting
(
Hindawi Publishing Corporation
, 2014 , Article)
The classification of handwriting into different categories, such as age, gender, and nationality, has several applications. In forensics, handwriting classification helps investigators focus on a certain category of ...
Learning-free handwritten word spotting method for historical handwritten documents
(
John Wiley and Sons Inc
, 2021 , Article)
Word spotting on degraded and noisy historical documents can become a challenging task considering the computational time and memory usage required to scan the entire document image. This paper proposes a new effective ...
An online signature verification system for forgery and disguise detection
(
Springer
, 2012 , Conference Paper)
Online signatures are acquired using a digital tablet which provides all the trajectory of the signature as well as the variation in pressure with respect to time. Therefore, online signature verification achieves higher ...
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
(
IEEE Computer Society
, 2022 , Article)
With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
AI-based Intrusion Detection for Intelligence Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
With the development of intelligent technologies, Internet of Things (IoT) opens up a new era in the field of automotive networks, namely Internet of Vehicles (IoV). The main goal of IoV is to provide a secure and reliable ...
Computer aided diagnosis system based on machine learning techniques for lung cancer
(2012 , Conference Paper)
Cancer is a leading cause of death worldwide. Lung cancer is a type of cancer that is considered as one of the most leading causes of death globally. In Malaysia, it is the 3rd common cancer type and the 2nd type of cancer ...
Malicious uav detection using integrated audio and visual features for public safety applications
(
MDPI AG
, 2020 , Article)
Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and remote monitoring. However, they also pose serious security threats to public privacy. The timely detection of a malicious drone is currently ...