Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Convolutional neural network for face recognition with pose and illumination variation
Face recognition remains a challenging problem till today. The main challenge is how to
improve the recognition performance when affected by the variability of non-linear effects …
improve the recognition performance when affected by the variability of non-linear effects …
Off-line writer verification based on simple graphemes
A method to writer verification based on handwritten stroke analysis is presented. The
proposed descriptors correspond to an estimation of the pressure applied when writing …
proposed descriptors correspond to an estimation of the pressure applied when writing …
2D face recognition system based on selected Gabor filters and linear discriminant analysis LDA
We present a new approach for face recognition system. The method is based on 2D face
image features using subset of non-correlated and Orthogonal Gabor Filters instead of using …
image features using subset of non-correlated and Orthogonal Gabor Filters instead of using …
Gender recognition using PCA and DCT of face images
In this paper we propose a gender recognition algorithm of face images. We have used PCA
and DCT for dimensionality reduction. The algorithm is based on a genetic algorithm to …
and DCT for dimensionality reduction. The algorithm is based on a genetic algorithm to …
Performance comparison of major classical face recognition techniques
The goal of this paper is to present a critical comparison of existing classical techniques on
recognition of human faces. This paper describes the four major classical face recognition …
recognition of human faces. This paper describes the four major classical face recognition …
[PDF][PDF] Development of efficient biometric recognition algorithms based on fingerprint and face
JP George - 2012 - archives.christuniversity.in
The reliable verification systems are required to verify and confirm the identity of an
individual requesting their service. Secure access to the buildings, laptops, cellular phones …
individual requesting their service. Secure access to the buildings, laptops, cellular phones …
[PDF][PDF] Performance comparison of face recognition using transform domain techniques
The biometrics is a powerful tool to authenticate a person for multiple applications. The face
recognition is better biometrics compared to other biometric traits as the image can be …
recognition is better biometrics compared to other biometric traits as the image can be …
IoT Fog-based Image Matching Monitoring System for Physical Access Control through IP Camera Devices
Many people are concerned with physical security and seek support from resources
provided by the latest technological advancements, such as security cameras with Internet …
provided by the latest technological advancements, such as security cameras with Internet …
A two-phase face recognition method in frequency domain
In this paper, we propose a two-phase face recognition method in frequency domain using
discrete cosine transform (DCT) and discrete Fourier transform (DFT). The absolute values …
discrete cosine transform (DCT) and discrete Fourier transform (DFT). The absolute values …
Face recognition based on global and local features
This paper presents an evaluation of different methods considering the usually problems in
face recognition. We consider variations in illumination, facial expression and facial details …
face recognition. We consider variations in illumination, facial expression and facial details …