派博傳思國際中心

標(biāo)題: Titlebook: Biometric Authentication; First International David Zhang,Anil K. Jain Conference proceedings 2004 Springer-Verlag Berlin Heidelberg 2004 [打印本頁]

作者: LH941    時間: 2025-3-21 18:12
書目名稱Biometric Authentication影響因子(影響力)




書目名稱Biometric Authentication影響因子(影響力)學(xué)科排名




書目名稱Biometric Authentication網(wǎng)絡(luò)公開度




書目名稱Biometric Authentication網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Biometric Authentication被引頻次




書目名稱Biometric Authentication被引頻次學(xué)科排名




書目名稱Biometric Authentication年度引用




書目名稱Biometric Authentication年度引用學(xué)科排名




書目名稱Biometric Authentication讀者反饋




書目名稱Biometric Authentication讀者反饋學(xué)科排名





作者: dictator    時間: 2025-3-22 00:14
A Two-Stage Dimensional Reduction Approach to Low-Dimensional Representation of Facial ImagesScaling) method. Experimental results using Yale, AT&T and FERET facial image databases show that the recognition performance of our methods degrades gracefully when low-dimensional features are used.
作者: Dorsal    時間: 2025-3-22 03:31

作者: 喚醒    時間: 2025-3-22 05:35

作者: 容易做    時間: 2025-3-22 10:18
https://doi.org/10.1007/978-3-663-04527-4hms in the field of automatic handwritten signature verification, we organized the First International Signature Verification Competition (SVC2004) recently as a?step towards establishing common benchmark databases and benchmarking rules. For each of the two tasks of the competition, a?signature dat
作者: 創(chuàng)造性    時間: 2025-3-22 13:09

作者: 尾巴    時間: 2025-3-22 20:06
https://doi.org/10.1007/978-3-322-81107-3ppearance. We are developing a face recognition system that uses three-dimensional depth information to make the system more robust to these arbitrary conditions. We have developed a face matching system that automatically correlates points in three dimensions between two 2.5D range images of differ
作者: Anecdote    時間: 2025-3-22 21:14

作者: antiandrogen    時間: 2025-3-23 05:04
Empirische Analyse des theoretischen Modellsers based on the features derived from the Trace transform. The MTT offers “texture” representation which is used to reduce the within-class variance, while STT provides “shape” characteristics which helps us maximize the between-class variance. In addition, weighted Trace transform (WTT) identifies
作者: Feckless    時間: 2025-3-23 08:17
Gang der empirischen Untersuchung is combined with a simplified Elastic Bunch Graph Matching (EBGM) algorithm. Considering that EBGM is too time-consuming, landmarks are grouped into contour points and inner points, and inner points are further separated into several groups according to the distribution around salient features. For
作者: 不感興趣    時間: 2025-3-23 11:39

作者: BLOT    時間: 2025-3-23 14:36

作者: 格子架    時間: 2025-3-23 20:55
Empirische Analyse des theoretischen Modellsected by a cell phone camera. Cell phone camera images tend to be of poorer quality and because of their portability, algorithms must deal with scale changes and dynamic outdoor illumination changes. While Individual PCA and FisherFaces focus on the image domain, Correlation Filters work in the freq
作者: 玷污    時間: 2025-3-23 23:20
Operationalisierung der Konstrukteons. Sparse representations of facial expressions are extracted to the three steps. In the first step, Gabor wavelet representation can extract edges of face components. In the second step, sparse features of facial expressions are extracted using fuzzy C-means(FCM) clustering algorithm on neutral f
作者: 鉤針織物    時間: 2025-3-24 03:29
Empirische Analyse des theoretischen Modells based on probabilistic models, this method views hallucination as a transformation between different image styles. We use Principal Component Analysis (PCA) to fit the input face image as a linear combination of the low-resolution face images in the training set. The high-resolution image is render
作者: 急性    時間: 2025-3-24 10:33

作者: affinity    時間: 2025-3-24 13:52
Gang der empirischen Untersuchunge verification. In particular, we assume that the gallery consists of one or a few digital images of a person’s face as reference and the probe set consists of video sequences as test data. The test data consists of a sequence of face images of a naturally moving person, captured from one or more ca
作者: CLOUT    時間: 2025-3-24 15:46

作者: 無能力    時間: 2025-3-24 22:58
Formen der langfristigen Finanzierung,specific facial feature, which generated from a well known subspace feature extraction technique- Fisher Discriminant Analysis, and hence produce a set of user specific compact code that coined as BioCode. The BioCode highly tolerant of data captures offsets, with same user facial data resulting in
作者: 夸張    時間: 2025-3-25 01:03

作者: Keshan-disease    時間: 2025-3-25 07:10
https://doi.org/10.1007/978-3-322-88020-8oring devices, low-dimensional representation of facial images is very important. Our approach is composed of two consecutive mappings of the input data. The first mapping is concerned with best separation of the input data into classes and the second focuses on the mapping that the distance relatio
作者: adhesive    時間: 2025-3-25 09:32
Biometric Authentication978-3-540-25948-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: needle    時間: 2025-3-25 15:09

作者: 膽小鬼    時間: 2025-3-25 16:21

作者: 充氣女    時間: 2025-3-25 23:31
Face Authentication Competition on the BANCA Databaseication. The contest was held on the publically available BANCA database?[1] according to a?defined protocol?[6]. Six different verification algorithms from 4 academic and commercial institutions submitted results. Also, a?standard set of face recognition software from the internet?[3] was used to provide a baseline performance measure.
作者: Rct393    時間: 2025-3-26 02:57
https://doi.org/10.1007/b98225Performance; Triangulation; biometric authentication; biometric systems; biometric technology; biometrics
作者: Interregnum    時間: 2025-3-26 08:13

作者: 不開心    時間: 2025-3-26 10:03
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/188162.jpg
作者: 陪審團每個人    時間: 2025-3-26 13:06
Gang der empirischen Untersuchungk (80% or more of the probes lack mates) using FERET datasets. In particular, Open Set TCM-kNN provides on the average 96% correct detection / rejection and identification using the PCA and/or Fisherfaces components for face representation.
作者: 我說不重要    時間: 2025-3-26 17:22

作者: 脊椎動物    時間: 2025-3-26 21:51
Gang der empirischen Untersuchunge searched by EBGM, and then used to adjust other points in the same group by using an affine transformation. Experimental results have shown that the proposed method greatly improves the alignment accuracy of ASM with only a little increase of time requirement since EBGM is only applied to a few control points.
作者: Defiance    時間: 2025-3-27 02:31
Operationalisierung der Konstruktessions based on the dimension model of internal states using a multi-layer perceptron. With dimension model we have improved the limitation of expression recognition based on basic emotions, and have extracted features automatically with a new approach using FCM algorithm and the dynamic linking model.
作者: 巡回    時間: 2025-3-27 06:08

作者: Mirage    時間: 2025-3-27 10:00

作者: Throttle    時間: 2025-3-27 16:17
Watch List Face Surveillance Using Transductive Inferencek (80% or more of the probes lack mates) using FERET datasets. In particular, Open Set TCM-kNN provides on the average 96% correct detection / rejection and identification using the PCA and/or Fisherfaces components for face representation.
作者: 終止    時間: 2025-3-27 20:15

作者: 杠桿    時間: 2025-3-27 21:57
Enhance the Alignment Accuracy of Active Shape Models Using Elastic Graph Matchinge searched by EBGM, and then used to adjust other points in the same group by using an affine transformation. Experimental results have shown that the proposed method greatly improves the alignment accuracy of ASM with only a little increase of time requirement since EBGM is only applied to a few control points.
作者: 混合    時間: 2025-3-28 05:49

作者: 別名    時間: 2025-3-28 08:17
Hallucinating Face by Eigentransformation with Distortion Reductione distortion in the hallucination process is reduced by adding constraints to the principal components of the hallucinated face. Experiments show that this method can produce satisfactory result even based on a small training set.
作者: 使苦惱    時間: 2025-3-28 11:18
What Can I Tell from Your Face?chniques. It turns out that all methods based on the same biometric measurements have the same intrinsic limitations, which can be only overcome by the adoption of a multi-modal or multi-algorithmic approach.
作者: 包裹    時間: 2025-3-28 16:29
https://doi.org/10.1007/978-3-663-04527-4ER) of 2.84% and that for Task?2 gives an EER of 2.89%. We believe that SVC2004 has successfully achieved its goals and the experience gained from SVC2004 will be very useful to similar activities in the future.
作者: 直覺好    時間: 2025-3-28 19:51

作者: 使尷尬    時間: 2025-3-29 00:25
Hypothesen und theoretisches Modello interdisciplinary research context. Beside the first-hand usage, the novel type of face model and the techniques may be employed in the areas of human-computer interaction, identification of cognition-psyche type of personality for personnel management, and some other future applications.
作者: 使饑餓    時間: 2025-3-29 03:56
Formen der langfristigen Finanzierung,he token containing the random data. This approach has significant functional advantages over solely biometrics ie. zero EER point and clean separation of the genuine and imposter populations, thereby allowing elimination of FARs without suffering from increased occurrence of FRRs.
作者: 阻止    時間: 2025-3-29 10:42
SVC2004: First International Signature Verification CompetitionER) of 2.84% and that for Task?2 gives an EER of 2.89%. We believe that SVC2004 has successfully achieved its goals and the experience gained from SVC2004 will be very useful to similar activities in the future.
作者: Instantaneous    時間: 2025-3-29 12:04

作者: Entrancing    時間: 2025-3-29 18:04

作者: Misnomer    時間: 2025-3-29 22:14

作者: conjunctivitis    時間: 2025-3-30 02:32
FVC2004: Third Fingerprint Verification Competitiond to ”light” systems, characterized by limited computational and storage resources. This paper summarizes the main activities of the FVC2004 organization and provides a first overview of the evaluation. Results will be further elaborated and officially presented at the International Conference on Biometric Authentication (Hong Kong) on July 2004.
作者: Vulnerable    時間: 2025-3-30 06:16

作者: Dendritic-Cells    時間: 2025-3-30 09:43

作者: jet-lag    時間: 2025-3-30 13:17
Face Authentication from Cell Phone Camera Images with Illumination and Temporal Variationsuency domain and offer advantages such as shift-invariance, ability to accommodate in-class image variability and closed form expressions. Results suggest that correlation filters offer better verification performance with this database.
作者: Discrete    時間: 2025-3-30 19:07

作者: Console    時間: 2025-3-30 21:03
https://doi.org/10.1007/978-3-322-81107-3tion, this paper has developed a novel subspace approach in determining the optimal projection. This algorithm effectively solves the small sample size problem and eliminates the possibility of losing discriminative information.
作者: GROG    時間: 2025-3-31 01:32
Gang der empirischen Untersuchungnsists of video sequences as test data. The test data consists of a sequence of face images of a naturally moving person, captured from one or more cameras. An automatic face recognition system involves face/head tracking and cropping, correlation filter based face matching, and combining the evidence from multiple frames of the face images.
作者: moratorium    時間: 2025-3-31 05:41

作者: 猛擊    時間: 2025-3-31 11:37
A Still-to-Video Face Verification System Using Advanced Correlation Filtersnsists of video sequences as test data. The test data consists of a sequence of face images of a naturally moving person, captured from one or more cameras. An automatic face recognition system involves face/head tracking and cropping, correlation filter based face matching, and combining the evidence from multiple frames of the face images.
作者: saphenous-vein    時間: 2025-3-31 16:29
Deponiebereiche und Wirtsgesteine,d to ”light” systems, characterized by limited computational and storage resources. This paper summarizes the main activities of the FVC2004 organization and provides a first overview of the evaluation. Results will be further elaborated and officially presented at the International Conference on Biometric Authentication (Hong Kong) on July 2004.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
从江县| 大同市| 开化县| 信丰县| 五大连池市| 衡阳县| 泸州市| 瑞丽市| 莎车县| 洛宁县| 青河县| 无棣县| 南丰县| 太仆寺旗| 南陵县| 渝北区| 高唐县| 东辽县| 西吉县| 邵阳市| 锡林浩特市| 化德县| 剑阁县| 舒兰市| 日喀则市| 齐河县| 邛崃市| 饶阳县| 济阳县| 德阳市| 民丰县| 西乌珠穆沁旗| 旅游| 黑山县| 新晃| 崇左市| 三原县| 鞍山市| 上饶市| 普安县| 台东市|