Sciweavers

415 search results - page 64 / 83
» Intruders pattern identification
Sort
View
ICB
2009
Springer
137views Biometrics» more  ICB 2009»
15 years 4 months ago
Palmprint Recognition Based on Regional Rank Correlation of Directional Features
Abstract. Automatic personal identification based on palmprints has been considered as a promising technology in biometrics family during recent years. In pursuit of accurate palmp...
Yufei Han, Zhenan Sun, Tieniu Tan, Ying Hao
DOLAP
2009
ACM
15 years 4 months ago
A taxonomy of ETL activities
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Panos Vassiliadis, Alkis Simitsis, Eftychia Baikou...
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
15 years 4 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon
IJCNN
2006
IEEE
15 years 3 months ago
Online Training of a Generalized Neuron with Particle Swarm Optimization
— Neural networks are used in a wide number of fields including signal and image processing, modeling and control and pattern recognition. Some of the most common type of neural ...
Raveesh Kiran, Sandhya R. Jetti, Ganesh K. Venayag...
MOBIDE
2005
ACM
15 years 3 months ago
DAIMON: data integration for a mobile network
We describe the DAIMON system for data integration of nomadic data. DAIMON is based on an extension of the mediator-wrapper architecture, where each node is a mediator of its own ...
Constantinos V. Katsaros, Ioannis L. Niarhos, Vasi...