[PDF][PDF] A survey on machine learning: concept, algorithms and applications
Over the past few decades, Machine Learning (ML) has evolved from the endeavour of few
computer enthusiasts exploiting the possibility of computers learning to play games, and a …
computer enthusiasts exploiting the possibility of computers learning to play games, and a …
[PDF][PDF] A new model for measuring customer utility trust in online auctions
Reports from the US Federal Bureau of investigation have indicated a lot of unethical
activities taking place on the internet environments. Despite some technical challenges …
activities taking place on the internet environments. Despite some technical challenges …
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication
Access control is already an integral part of the Internet of Things (IoT) to prevent
unauthorized use of systems. However, in the post-pandemic world, contactless …
unauthorized use of systems. However, in the post-pandemic world, contactless …
Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots
M Mariappan, M Nadarajan, RR Porle… - Journal of …, 2016 - research.monash.edu
Abstract Telepresence Mobile Robots have prominent attributes in many fields as it provides
virtual presence for human robot interaction. The deployment of this robot in healthcare …
virtual presence for human robot interaction. The deployment of this robot in healthcare …
A secure multimodal authentication system based on chaos cryptography and fuzzy fusion of iris and face
MM Eid, MA Mohamed - 2017 Intl Conf on Advanced Control …, 2017 - ieeexplore.ieee.org
The rising attention of terrorism violations approve that applicable and accurate systems is
more needed. The saved or transmitted templates increase the chance of compromise the …
more needed. The saved or transmitted templates increase the chance of compromise the …
Multimodal biometric authentication using choquet integral and genetic algorithm
The Choquet integral is a tool for the information fusion that is very effective in the case
where fuzzy measures associated with it are well chosen. In this paper, we propose a new …
where fuzzy measures associated with it are well chosen. In this paper, we propose a new …
[PDF][PDF] Authentification multimodale d'un individu par le visage, l'empreinte digitale et la paume de la main
L Rzouga, A BenKhalifa… - Le Colloque de …, 2012 - researchgate.net
L'authentification du visage, de l'empreinte palmaire et de l'empreinte digitale relève du
domaine de la biométrie. Le contexte d'utilisation se situe particulièrement dans les milieux …
domaine de la biométrie. Le contexte d'utilisation se situe particulièrement dans les milieux …
[PDF][PDF] COMPARATIVE ANALYSIS EVALUATION OF INTELLIGENT FACE RECOGNITION
K Karapurkar, SE Cardo, BS Nausheeda - SACAIM-2022, 2022 - researchgate.net
Intelligent face recognition has become a basic technology in work and life. This technology
has been immensely used in various products and is well known by people in all sectors …
has been immensely used in various products and is well known by people in all sectors …
Analysis of Facial Image by Gradient Boosting Locally Extracted Features
Face recognition systems running on commodity hardware arguably play the most important
role as reinforcement for human computer interfacing. This paper intends to tackle the …
role as reinforcement for human computer interfacing. This paper intends to tackle the …
Advanced face recognition system using chaos cryptography and haar wavelet
MM Eid, MA Mohamed - 2017 12th International Conference on …, 2017 - ieeexplore.ieee.org
Recently, face recognition systems with extra features gain high attention than classical
ones. Although, there are various attacks for breaching typical systems, one of the most …
ones. Although, there are various attacks for breaching typical systems, one of the most …