Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
Dual-Branch Multitask Fusion Network for Offline Chinese Writer Identification
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Volume 23, Issue 2Article No.: 24, Pages 1–22https://doi.org/10.1145/3638554Chinese characters are complex and contain discriminative information, meaning that their writers have the potential to be recognized using less text. In this study, offline Chinese writer identification based on a single character was investigated. To ...
- research-articleNovember 2023
ZJUT-EIFD: A Synchronously Collected External and Internal Fingerprint Database
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 46, Issue 4April 2024, Pages 2267–2284https://doi.org/10.1109/TPAMI.2023.3334760External fingerprints (EFs) based only on epidermal information are vulnerable to spoofing attacks and non-ideal skin conditions. To solve such shortcomings, internal fingerprints (IFs) collected using optical coherence tomography (OCT) have been proposed ...
- research-articleMay 2023
Anti-spoofing study on palm biometric features
Expert Systems with Applications: An International Journal (EXWA), Volume 218, Issue CMay 2023https://doi.org/10.1016/j.eswa.2023.119546Highlights- A dual-wavelength synchronous acquisition system is proposed.
- Static (palmprint, vein) and dynamic (SpO2, pulse) biometrics acquired at same time.
- Most multispectrum systems are upgradeable for liveness info with minimal ...
Spoofing attacks severely threaten the security of biometric recognition systems. Two concerns are raised regarding palm biometrics. First, the anti-spoofing ability of the palm vein as a subcutaneous feature needs further exploration. In-depth ...
- research-articleJanuary 2023
A New Approach in Automated Fingerprint Presentation Attack Detection Using Optical Coherence Tomography
IEEE Transactions on Information Forensics and Security (TIFS), Volume 182023, Pages 4243–4257https://doi.org/10.1109/TIFS.2023.3293414Presentation attack detection (PAD) is a critical component of automated fingerprint recognition systems (AFRSs). However, existing PAD technologies based on optical coherence tomography (OCT) mainly rely on local information, ignoring the global ...
- doctoral_thesisJanuary 2022
Topological Abel-Jacobi Map for Hypersurfaces in Complex Projective Four-Space
AbstractThe beginning of the study of the Abel-Jacobi map originates from an attempt to solve the indefinite integral∫ dx/√ x 3 + ax2 + bx + c . (1)For a long time, mathematicians were unable to solve.In the point of view of algebraic geometry, (1) can be ...
-
- ArticleSeptember 2021
A STN-Based Self-supervised Network for Dense Fingerprint Registration
AbstractDense fingerprint registration in the preprocessing stage plays a vital role in the subsequent fingerprint fusion, mosaic, and recognition. However, the existing conventional methods are limited by handcraft features, while the methods based on ...
- research-articleJanuary 2020
Adaptive Dynamic Surface Integral Sliding Mode Fault-Tolerant Control for Multimachine Excitation Systems with SVC
In this paper, an adaptive dynamic surface integral sliding mode fault-tolerant controller is designed for the multimachine power system with static var compensator (SVC) to overcome the problem of actuator failure. The main features of the proposed ...
- ArticleAugust 2011
Robust Parametric Control for Autonomous Rendezvous of Spacecraft
ISIC '11: Proceedings of the 2011 International Conference on Information Security and Intelligence ControlAugust 2011, Pages 284–287This paper proposes a method to design the robust parametric control for autonomous rendezvous of spacecrafts when the inertial information with uncertainty. We consider model uncertainty of traditional C-W equation to formulate the dynamic model of the ...
- ArticleOctober 2010
Modeling and Protocol Design for a Class of Networked Control Systems
IPTC '10: Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted ComputingOctober 2010, Pages 328–331https://doi.org/10.1109/IPTC.2010.20This kind of control systems wherein the control loops are closed through a real time communication network can be called networked control systems. Networked control system is a new hot topic in the control engineering. The reduction of bandwidth ...
- ArticleMarch 2010
Adaptive Genetic Algorithm Enhancements for Path Planning of Mobile Robots
ICMTMA '10: Proceedings of the 2010 International Conference on Measuring Technology and Mechatronics Automation - Volume 01March 2010, Pages 416–419https://doi.org/10.1109/ICMTMA.2010.44an adaptive Genetic Algorithm (GA) is proposed, which focuses on the automatic adjustments of crossover probability and mutation probability with the changeable environmental parameters. The improved algorithm can overcome some disadvantages of ...