Sciweavers

ICANN
2005
Springer
13 years 10 months ago
Handwritten Digit Recognition with Nonlinear Fisher Discriminant Analysis
Abstract. To generalize the Fisher Discriminant Analysis (FDA) algorithm to the case of discriminant functions belonging to a nonlinear, finite dimensional function space F (Nonli...
Pietro Berkes
ICMCS
2005
IEEE
134views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Relevance Feedback Methods in Content Based Retrieval and Video Summarization
In the current state-of-the-art in multimedia content analysis (MCA), the fundamental techniques are typically derived from core pattern recognition and computer vision algorithms...
Micha Haas, Ard Oerlemans, Michael S. Lew
ICDAR
2005
IEEE
13 years 10 months ago
Fast Vector Matching Methods and Their Applications to Handwriting Recognition
A common practice in pattern recognition is to classify an unknown object by matching its feature vector with all the feature vectors stored in a database. When the number of clas...
Ying-Ho Liu, Wen-Hsiung Lin, Fu Chang, Chin-Chin L...
AUTOID
2005
IEEE
13 years 11 months ago
A Fast Algorithm for ICP-Based 3D Shape Biometrics
In a biometrics scenario, gallery images are enrolled into the database ahead of the matching step, which gives us the opportunity to build related data structures before the prob...
Ping Yan, Kevin W. Bowyer
AUTOID
2005
IEEE
13 years 11 months ago
Impedance Matching Concepts in RFID Transponder Design
In this paper, we analyze impedance matching concepts in passive radio frequency identification (RFID) transponders, which are powered by the incoming RF energy and consist of an...
K. V. S. Rao, Pavel V. Nikitin, Sander F. Lam
AUTOID
2005
IEEE
13 years 11 months ago
An Ultra-Low Power, Optically-Interrogated Smart Tagging and Identification System
We present a wireless identification system that employs an optical communications link between an array of uniquely identifiable smart tags and an interrogator flashlight. As the...
Gerardo Barroeta Perez, Mateusz Malinowski, Joseph...
AUTOID
2005
IEEE
13 years 11 months ago
Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research
In this paper, we outline a framework for appropriate and proper usage of simulated data for biometric authentication. Currently, there are no formal guidelines concerning the use...
Yan Ma, Michael E. Schuckers, Bojan Cukic
AUTOID
2005
IEEE
13 years 11 months ago
Experiments with an Improved Iris Segmentation Algorithm
Iris is claimed to be one of the best biometrics. We have collected a large data set of iris images, intentionally sampling a range of quality broader than that used by current co...
Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn
AUTOID
2005
IEEE
13 years 11 months ago
A Low Power and High Performance Analog Front End for Passive RFID Transponder
This paper presents a novel low power and high performance analog front end circuit for passive RFID transponder. With a novel architecture including three rectifier circuits, amo...
Jianyun Hu, Hao Min
AUTOID
2005
IEEE
13 years 11 months ago
Statistical Models for Assessing the Individuality of Fingerprints
Following Daubert in 1993, forensic evidence based on fingerprints was first challenged in the 1999 case of USA vs. Byron Mitchell, and subsequently, in 20 other cases involving...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain