A taxonomy of food supply chain problems from a computational intelligence perspective
In the last few years, the Internet of Things, and other enabling technologies, have been
progressively used for digitizing Food Supply Chains (FSC). These and other digitalization …
progressively used for digitizing Food Supply Chains (FSC). These and other digitalization …
An encoded histogram of ridge bifurcations and contours for fingerprint presentation attack detection
In recent years, the exponential growth of internet technologies has made personal
authentication an integral part of security applications. The fingerprint-based biometric …
authentication an integral part of security applications. The fingerprint-based biometric …
Accelerating automatic hate speech detection using parallelized ensemble learning models
With increasing number of social media users and online engagement, it is essential to
study hate speech propagation on social media platforms (SMPs). Automatic hate speech …
study hate speech propagation on social media platforms (SMPs). Automatic hate speech …
Advancements and challenges in fingerprint presentation attack detection: a systematic literature review
In the rapidly evolving domain of biometric security, the significance of Fingerprint
Presentation Attack Detection (FPAD) has become increasingly paramount, given the …
Presentation Attack Detection (FPAD) has become increasingly paramount, given the …
Incremental learning algorithm for dynamic evolution of domain specific vocabulary with its stability and plasticity analysis
Abstract Domain-specific vocabulary, which is crucial in fields such as Information Retrieval
and Natural Language Processing, requires continuous updates to remain effective …
and Natural Language Processing, requires continuous updates to remain effective …
Leveraging deep learning to fingerprint spoof detectors: hitherto and futuristic perspectives
Fingerprints being the most widely employed biometric trait, due to their high acceptability
and low sensing cost, have replaced the traditional methods of human authentication …
and low sensing cost, have replaced the traditional methods of human authentication …
An ensemble semi-supervised adaptive resonance theory model with explanation capability for pattern classification
Most semi-supervised learning (SSL) models entail complex structures and iterative training
processes as well as face difficulties in interpreting their predictions to users. To address …
processes as well as face difficulties in interpreting their predictions to users. To address …
SFincBuster: Spoofed fingerprint buster via incremental learning using leverage bagging classifier
The fingerprint presentation attack detection (PAD) studies are extensively explored by
investigators to augment the security aspects of human authentication in biometric systems …
investigators to augment the security aspects of human authentication in biometric systems …
[PDF][PDF] Detecting and learning the unknown in semantic segmentation
Semantic segmentation is a crucial component for perception in automated driving. Deep
neural networks (DNNs) are commonly used for this task, and they are usually trained on a …
neural networks (DNNs) are commonly used for this task, and they are usually trained on a …
Enhancing Fingerprint Authentication: A Systematic Review of Liveness Detection Methods Against Presentation Attacks
The robustness of automatic fingerprint identification systems (AFIS) against presentation
attacks, a pressing concern in biometric security, is critically dependent on the efficacy of …
attacks, a pressing concern in biometric security, is critically dependent on the efficacy of …