Automated species identification: why not?

KJ Gaston, MA O'Neill - … of the Royal Society of London …, 2004 - royalsocietypublishing.org
Where possible, automation has been a common response of humankind to many activities
that have to be repeated numerous times. The routine identification of specimens of …

[图书][B] Biometric authentication: first international conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, proceedings

DY Zhang, AK Jain - 2004 - books.google.com
The past decade has seen a rapid growth in the demand for biometric-based-thentication
solutions for a number of applications. With signi? cant advances in biometrictechnologyandanincreaseinthenu …

[PDF][PDF] Personal authentication using hand-geometry and palmprint features–the state of the art

N Pavešić, S Ribarić, D Ribarić - Hand, 2004 - isustavi.com
In this paper we present an overview of the fundamentals of personal authentication based
on handgeometry measurements and palmprint features. Unimodal and multimodal hand …

Feature-level fusion for effective palmprint authentication

AWK Kong, D Zhang - International Conference on Biometric …, 2004 - Springer
A feature-level fusion approach is proposed for improving the efficiency of palmprint
identification. Multiple Gabor filters are employed to extract the phase information on a …

When faces are combined with palmprints: A novel biometric fusion strategy

G Feng, K Dong, D Hu, D Zhang - International Conference on Biometric …, 2004 - Springer
This paper presents a novel fusion strategy for personal identification using face and
palmprint biometrics. In the context of biometrics, three levels of information fusion schemes …

A new method in locating and segmenting palmprint into region-of-interest

C Poon, DCM Wong, HC Shen - Proceedings of the 17th …, 2004 - ieeexplore.ieee.org
Various techniques in analyzing palmprint have been proposed but to the best of our
knowledge, none has been studied on the selection and division of the region-of-interest …

PalmHashing: a novel approach for dual-factor authentication

T Connie, A Teoh, M Goh, D Ngo - Pattern Analysis and Applications, 2004 - Springer
Many systems require a reliable personal authentication infrastructure to recognise the
identity of a claimant before granting access to him/her. Conventional secure measures …

An improved LDA approach

XY Jing, D Zhang, YY Tang - IEEE Transactions on Systems …, 2004 - ieeexplore.ieee.org
Linear discrimination analysis (LDA) technique is an important and well-developed area of
image recognition and to date many linear discrimination methods have been put forward …

Wavelet based independent component analysis for palmprint identification

GM Lu, KQ Wang, D Zhang - Proceedings of 2004 International …, 2004 - ieeexplore.ieee.org
This work presents a multi-resolution analysis based independent component analysis (ICA)
method for automatic palmprint identification. The ICA is well known by its feature …

Using a victim buffer in an application-specific memory hierarchy

C Zhang, F Vahid - … Design, Automation and Test in Europe …, 2004 - ieeexplore.ieee.org
Customizing a memory hierarchy to a particular application or applications is becoming
increasingly common in embedded system design, with one benefit being reduced energy …