Ear recognition: More than a survey

Ž Emeršič, V Štruc, P Peer - Neurocomputing, 2017 - Elsevier
Automatic identity recognition from ear images represents an active field of research within
the biometric community. The ability to capture ear images from a distance and in a covert …

[HTML][HTML] Advances and trends in real time visual crowd analysis

K Khan, W Albattah, RU Khan, AM Qamar, D Nayab - Sensors, 2020 - mdpi.com
Real time crowd analysis represents an active area of research within the computer vision
community in general and scene analysis in particular. Over the last 10 years, various …

Unconstrained ear recognition using deep neural networks

S Dodge, J Mounsef, L Karam - IET Biometrics, 2018 - Wiley Online Library
The authors perform unconstrained ear recognition using transfer learning with deep neural
networks (DNNs). First, they show how existing DNNs can be used as a feature extractor …

[图书][B] Natural language processing and computational linguistics: speech, morphology and syntax

MZ Kurdi - 2016 - books.google.com
Natural language processing (NLP) is a scientific discipline which is found at the interface of
computer science, artificial intelligence and cognitive psychology. Providing an overview of …

A robust technique for copy-move forgery detection from small and extremely smooth tampered regions based on the DHE-SURF features and mDBSCAN clustering

M Bilal, HA Habib, Z Mehmood, RM Yousaf… - Australian Journal of …, 2021 - Taylor & Francis
The keypoint-based copy-move forgery (CMF) detection is one of the most widely used CMF
detection methods; however the keypoint-based CMF detection method cannot effectively …

Single and multiple copy–move forgery detection and localization in digital images based on the sparsely encoded distinctive features and DBSCAN clustering

M Bilal, HA Habib, Z Mehmood, T Saba… - Arabian Journal for …, 2020 - Springer
Due to the advancements in digital image processing and multimedia devices, the digital
image can be easily tampered and presented as evidence in judicial courts, print media …

Performance analysis and comparison of ITO-and FTO-based optically transparent terahertz U-shaped patch antennas

AS Thampy, SK Dhamodharan - Physica E: Low-dimensional Systems and …, 2015 - Elsevier
An indium-doped tin oxide (ITO) and a fluorine-doped tin oxide (FTO)-based optically
transparent U-shaped patch antennas are designed to resonate at 750 GHz and their …

An integrated approach to emotion recognition and gender classification

KP Rao, MVPCS Rao, NH Chowdary - Journal of Visual Communication …, 2019 - Elsevier
The human-computer communication adds to worldwide access to training, information
upgrade and the conveyance of value learning and instructions. Furthermore, the changing …

An analysis of image forgery detection techniques

C Deep Kaur, N Kanwal - Statistics, Optimization & Information …, 2019 - iapress.org
Society is becoming increasingly dependent on the internet and so does it become more
and more vulnerable to harmful threats. These threats are becoming vigorous and …

[PDF][PDF] An improved cat swarm optimization algorithm based on opposition-based learning and Cauchy operator for clustering

Y Kumar, G Sahoo - Journal of Information Processing Systems, 2017 - koreascience.kr
Clustering is a NP-hard problem that is used to find the relationship between patterns in a
given set of patterns. It is an unsupervised technique that is applied to obtain the optimal …