G Lippi, L Chiozza, C Mattiuzzi… - Journal of medical …, 2017 - ncbi.nlm.nih.gov
Patient and sample misidentification may cause significant harm or discomfort to the patients, especially when incorrect data is used for performing specific healthcare activities …
Applied machine learning research has the potential to fuel further advances in data science, but it is greatly hindered by an ad hoc design process, poor data hygiene, and a …
CI Moon, O Lee - IEEE Access, 2021 - ieeexplore.ieee.org
The skin surface is composed of a network-like microstructure comprising wrinkles. Observing and analyzing the microstructure of the skin that changes with the skin condition …
Besides genetic characteristics, people also undergo a process of skin aging under the influence of diverse factors such as sun exposure, food intake, sleeping patterns, and …
WM Matkowski, AWK Kong - 2020 IEEE International Joint …, 2020 - ieeexplore.ieee.org
Soft biometric attributes such as gender, ethnicity or age may provide useful information for biometrics and forensics applications. Researchers used, eg, face, gait, iris, and hand, etc. to …
FKS Chan, X Li, AWK Kong - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Skin texture without obvious features is different from other hard biometrics on the skin, such as fingerprints and palmprints. Skin texture gives an impression that it is not distinctive like …
Skin appearance is almost universally the object of gender-related expectations and stereotypes. This not with standing, remarkably little work has been done on establishing …
K Jamshidi, R Toosi, MA Akhaee - Computer, 2024 - ieeexplore.ieee.org
Here, we propose a three-stream structure for hand gender recognition. The proposed method employs convolutional neural networks for feature extraction and classification parts …
X Qu, D Zhang, G Lu, Z Guo - IEEE Transactions on Systems …, 2016 - ieeexplore.ieee.org
Biometric applications have been used globally in everyday life. However, conventional biometrics is created and optimized for high-security scenarios. Being used in daily life by …