A feature extraction method using the chaincode representation of fingerprint ridge contours is presented for use by Automatic Fingerprint Identification Systems. The representa...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
Case-based planning (CBP) systems are based on the idea of reusing past successful plans for solving new problems. Previous research has shown the ability of meta-reasoning approac...
Deformations in handwritten characters have classdependent tendencies. For example, characters of class “A” are often deformed by global slant transformation and never deforme...
Seiichi Uchida, Mohammad Asad Ronee, Hiroaki Sakoe
Abstract—In this treatise we propose a three-stage twin-transmitantenna assisted MultiUser (MU) Direct Sequence Code-Division Mulitple Access (DS-CDMA) system employing both a Un...
Chong Xu, Mohammed El-Hajjar, Robert G. Maunder, L...