• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,625
Next 10 →

Example-based learning for view-based human face detection

by Kah-kay Sung, Tomaso Poggio - IEEE Transactions on Pattern Analysis and Machine Intelligence , 1998
"... Abstract—We present an example-based learning approach for locating vertical frontal views of human faces in complex scenes. The technique models the distribution of human face patterns by means of a few view-based “face ” and “nonface ” model clusters. At each image location, a difference feature v ..."
Abstract - Cited by 690 (24 self) - Add to MetaCart
Abstract—We present an example-based learning approach for locating vertical frontal views of human faces in complex scenes. The technique models the distribution of human face patterns by means of a few view-based “face ” and “nonface ” model clusters. At each image location, a difference feature

Structural Equation Modeling And Regression: Guidelines For Research Practice

by David Gefen, Detmar W. Straub, Marie-Claude Boudreau - COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS , 2000
"... The growing interest in Structured Equation Modeling (SEM) techniques and recognition of their importance in IS research suggests the need to compare and contrast different types of SEM techniques so that research designs can be appropriately selected. After assessing the extent to which these techn ..."
Abstract - Cited by 454 (9 self) - Add to MetaCart
The growing interest in Structured Equation Modeling (SEM) techniques and recognition of their importance in IS research suggests the need to compare and contrast different types of SEM techniques so that research designs can be appropriately selected. After assessing the extent to which

Palmprint recognition using 3-D information

by David Zhang, Guangming Lu, Wei Li, Lei Zhang, Nan Luo - PROCEEDINGS OF THE IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, (IEEE‟09), IEEE XPLORE PRESS , 2009
"... Palmprint has proved to be one of the most unique and stable biometric characteristics. Almost all the current palmprint recognition techniques capture the 2-D image of the palm surface and use it for feature extraction and matching. Although 2-D palmprint recognition can achieve high accuracy, the ..."
Abstract - Cited by 14 (3 self) - Add to MetaCart
Palmprint has proved to be one of the most unique and stable biometric characteristics. Almost all the current palmprint recognition techniques capture the 2-D image of the palm surface and use it for feature extraction and matching. Although 2-D palmprint recognition can achieve high accuracy

Palmprint Recognition using Phase Symmetry

by Subhajit Karar, Ranjan Parekh
"... Abstract- This paper proposes an automated system for recognizing palmprints for biometric identification of individuals. Palmprint images are converted to the frequency domain using 2D DFT and thereafter bandpass filtered using a log-Gabor filter to extract the phase symmetry information. Classific ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. Classification is done on basis of correlation between training and testing set images. The approach is tested over a data set of 200 images divided into 10 classes and seen to provide 100% recognition accuracy. A contemporary technique is also implemented on the current dataset for comparison of accuracy

Machine Learning Research: Four Current Directions

by Thomas G. Dietterich , 1997
"... Machine Learning research has been making great progress in many directions. This article summarizes four of these directions and discusses some current open problems. The four directions are (a) improving classification accuracy by learning ensembles of classifiers, (b) methods for scaling up super ..."
Abstract - Cited by 287 (0 self) - Add to MetaCart
learning theory, neural networks, statistics, and pattern recognition have discovered one another and begun to work together. Second, machine learning techniques are being applied to new kinds of problems including knowledge discovery in databases, language processing, robot control, and combinatorial

Knowledge-based protein secondary structure assignment

by Dmitrij Frishman, Patrick Argos - Proteins , 1995
"... ABSTRACT We have developed an auto-matic algorithm STRIDE for protein secondary structure assignment from atomic coordinates based on the combined use of hydrogen bond energy and statistically derived backbone tor-sional angle information. Parameters of the pattern recognition procedure were optimiz ..."
Abstract - Cited by 324 (2 self) - Add to MetaCart
optimized using designations provided by the crystallog-raphers as a standard-of-truth. Comparison to the currently most widely used technique DSSP by Kabsch and Sander (Biopolymers 222577-2637, 1983) shows that STRIDE and DSSP as-sign secondary structural states in 58 and 31% of 226 protein chains in our

Three dimensional palmprint recognition

by Wei Li, Lei Zhang, David Zhang - SMC , 2009
"... Palmprint has been widely studied as its high accuracy and low cost. Most of the previous studies are based on two dimensional (2D) image of the palmprint. However, 2D image can be easily forged, which will threaten the security of palmprint authentication system. Furthermore, 2D image can be easil ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
) is extracted. Then the Competitive Coding (CompCode) technique is used to code the 3D palmprint pattern according the MCI. By using score level fusion of MCI and its CompCode, promising recognition performance is achieved on our established 3D palmprint database.

Pose Invariant Palmprint Recognition

by Chhaya Methani, Anoop M. Namboodiri
"... Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those for surveillance, can dramatically increase the applicability of such a system. However, the performance of existing tec ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
techniques for palmprint authentication fall considerably, when the camera is not aligned with the surface of the palm. The problems arise primarily due to variations in appearance introduced due to varying pose, but is compounded by specularity of the skin and blur due to motion and focus. In this paper, we

A Survey on Palmprint Recognition

by Assistant Professor, Parmeshwar Manegopale
"... Abstract: Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Palmprint recognition is one of the popular methods which has been investigated over last fifteen years due to its severa ..."
Abstract - Add to MetaCart
Abstract: Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Palmprint recognition is one of the popular methods which has been investigated over last fifteen years due to its

Survey of Palmprint Recognition

by Priyanka Somvanshi, Milind Rane
"... Abstract — A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric has gained much attention in the security world recently. Many typ ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
based on the principal lines, wrinkles and ridges on the surface of the palm. The recognition process consists of image acquisition, preprocessing, feature extraction, matching and result. The different techniques are used for the preprocessing, feature extraction, classifiers. The methods discussed
Next 10 →
Results 1 - 10 of 1,625
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University