Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Multibiometric fusion strategy and its applications: A review
The unimodal biometric based system faced several inherent problems like lack of
uniqueness, intra-class variation, non-universality, noisy data (presence of dirt on the …
uniqueness, intra-class variation, non-universality, noisy data (presence of dirt on the …
The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Score normalization in multimodal biometric systems
Multimodal biometric systems consolidate the evidence presented by multiple biometric
sources and typically provide better recognition performance compared to systems based on …
sources and typically provide better recognition performance compared to systems based on …
Behavioral biometrics & continuous user authentication on mobile devices: A survey
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
On-line signature recognition based on VQ-DTW
M Faundez-Zanuy - Pattern Recognition, 2007 - Elsevier
This paper studies some pattern recognition algorithms for on-line signature recognition:
vector quantization (VQ), nearest neighbor (NN), dynamic time war** (DTW) and hidden …
vector quantization (VQ), nearest neighbor (NN), dynamic time war** (DTW) and hidden …
Noninterference and the composability of security properties
D McCullough - Proceedings. 1988 IEEE Symposium on Security and …, 1988 - computer.org
The current development of interactive systems is shifting its focus into adding new features
and capabilities, encompassing for example, new input devices and ways of interacting …
and capabilities, encompassing for example, new input devices and ways of interacting …
Biometric identification systems
In this paper, we provide an overview of the fundamentals of biometric identification,
together with a description of the main biometric technologies currently in use, all of them …
together with a description of the main biometric technologies currently in use, all of them …
Introduction to multibiometrics
Most biometric systems that are presently in use, typically use a single biometric trait to
establish identity (ie, they are unibiometric systems). With the proliferation of biometric …
establish identity (ie, they are unibiometric systems). With the proliferation of biometric …
Fusion of visual and thermal signatures with eyeglass removal for robust face recognition
This paper describes a fusion of visual and thermal infrared (IR) images for robust face
recognition. Two types of fusion methods are discussed: data fusion and decision fusion …
recognition. Two types of fusion methods are discussed: data fusion and decision fusion …
[KİTAP][B] Real life applications of soft computing
Rapid advancements in the application of soft computing tools and techniques have proven
valuable in the development of highly scalable systems. Although many resources on the …
valuable in the development of highly scalable systems. Although many resources on the …