Sciweavers

ACSC
2015
IEEE
9 years 8 months ago
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
Sepehr Damavandinejadmonfared, Vijay Varadharajan
ACSC
2015
IEEE
9 years 8 months ago
A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
Jeff Herbert, Alan Litchfield
ACSC
2015
IEEE
9 years 8 months ago
An Integration of Software Engineering Methods and Semantic Technologies for Drafting and Modeling Statutes and Legal Rules
The semantic representation and modeling of legal texts has for a long time been a significant research challenge. While approaches from both, software engineering and semantic m...
Martin Stabauer, Gerald Quirchmayr, Johann Hö...
ACSC
2015
IEEE
9 years 8 months ago
Visualising Moving Clusters using Cluster Flow Diagrams
Moving clusters represent groups of objects that move together, for instance, groups of people evacuating a building. However, because moving clusters are composed of lists of clu...
Jason Thompson, Torab Torabi
ACSC
2015
IEEE
9 years 8 months ago
Schema Mapping Using Hybrid Ripple-Down Rules
Schema mapping is essential to manage schema heterogeneity among different sources. Schema mapping can be conducted by using machine learning algorithms or by knowledge engineerin...
Sarawat Anam, Yang Sok Kim, Byeong Ho Kang, Qing L...
Theoretical Computer Science
Top of PageReset Settings