ACSC
9 years 8 months ago
2015 IEEE
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
ACSC
9 years 8 months ago
2015 IEEE
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
ACSC
9 years 8 months ago
2015 IEEE
The semantic representation and modeling of legal texts has for a long time been a significant research challenge. While approaches from both, software engineering and semantic m...
ACSC
9 years 8 months ago
2015 IEEE
Moving clusters represent groups of objects that move together, for instance, groups of people evacuating a building. However, because moving clusters are composed of lists of clu...
ACSC
9 years 8 months ago
2015 IEEE
Schema mapping is essential to manage schema heterogeneity among different sources. Schema mapping can be conducted by using machine learning algorithms or by knowledge engineerin...
|