[PDF][PDF] A survey on machine learning: concept, algorithms and applications

K Das, RN Behera - International Journal of Innovative Research in …, 2017 - smec.ac.in
Over the past few decades, Machine Learning (ML) has evolved from the endeavour of few
computer enthusiasts exploiting the possibility of computers learning to play games, and a …

[PDF][PDF] A new model for measuring customer utility trust in online auctions

ESM El-Kenawy, M Eid, AH Ismail - International Journal of …, 2020 - researchgate.net
Reports from the US Federal Bureau of investigation have indicated a lot of unethical
activities taking place on the internet environments. Despite some technical challenges …

A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication

M Hasan, T Hoque, F Ganji, D Woodard, D Forte… - Journal of Hardware and …, 2024 - Springer
Access control is already an integral part of the Internet of Things (IoT) to prevent
unauthorized use of systems. However, in the post-pandemic world, contactless …

Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots

M Mariappan, M Nadarajan, RR Porle… - Journal of …, 2016 - research.monash.edu
Abstract Telepresence Mobile Robots have prominent attributes in many fields as it provides
virtual presence for human robot interaction. The deployment of this robot in healthcare …

A secure multimodal authentication system based on chaos cryptography and fuzzy fusion of iris and face

MM Eid, MA Mohamed - 2017 Intl Conf on Advanced Control …, 2017 - ieeexplore.ieee.org
The rising attention of terrorism violations approve that applicable and accurate systems is
more needed. The saved or transmitted templates increase the chance of compromise the …

Multimodal biometric authentication using choquet integral and genetic algorithm

AB Khalifa, S Gazzah, NEB Amara - arXiv preprint arXiv:1804.00528, 2018 - arxiv.org
The Choquet integral is a tool for the information fusion that is very effective in the case
where fuzzy measures associated with it are well chosen. In this paper, we propose a new …

[PDF][PDF] Authentification multimodale d'un individu par le visage, l'empreinte digitale et la paume de la main

L Rzouga, A BenKhalifa… - Le Colloque de …, 2012 - researchgate.net
L'authentification du visage, de l'empreinte palmaire et de l'empreinte digitale relève du
domaine de la biométrie. Le contexte d'utilisation se situe particulièrement dans les milieux …

[PDF][PDF] COMPARATIVE ANALYSIS EVALUATION OF INTELLIGENT FACE RECOGNITION

K Karapurkar, SE Cardo, BS Nausheeda - SACAIM-2022, 2022 - researchgate.net
Intelligent face recognition has become a basic technology in work and life. This technology
has been immensely used in various products and is well known by people in all sectors …

Analysis of Facial Image by Gradient Boosting Locally Extracted Features

A Vinay, VR Kamath, YK Guntupalli… - … on Advances in …, 2019 - ieeexplore.ieee.org
Face recognition systems running on commodity hardware arguably play the most important
role as reinforcement for human computer interfacing. This paper intends to tackle the …

Advanced face recognition system using chaos cryptography and haar wavelet

MM Eid, MA Mohamed - 2017 12th International Conference on …, 2017 - ieeexplore.ieee.org
Recently, face recognition systems with extra features gain high attention than classical
ones. Although, there are various attacks for breaching typical systems, one of the most …