Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   15  
      Image ProcessingPattern RecognitionNeural NetworkDatabases
    • by 
    •   15  
      Computer NetworksStochastic processesLearningUncertainty
    • by 
    •   2  
      Image ProcessingSignature Recognition
Handwritten signature is being used in various applications on daily basis. The problem arises when someone decides to imitate our signature and steal our identity. Therefore, there is a need for adequate protection of signatures and a... more
    • by 
    •   5  
      MathematicsGraph TheoryBiometricsIdentification
    • by 
    •   15  
      Information SystemsCognitive ScienceUsabilityEvaluation
    • by 
    •   6  
      MathematicsComputer ScienceScience and TechnologyKey words
    • by 
    •   4  
      Extreme Value TheoryFeature ExtractionSignature RecognitionExperimental Method
    • by 
    •   6  
      BiometricsAccuracyDynamic Time WarpingSignature Recognition
    • by 
    •   11  
      EngineeringGesture RecognitionFeature SelectionSensors
    • by 
    •   8  
      Information SystemsFace RecognitionBiometricsImage Classification
    • by 
    •   8  
      Information SystemsFace RecognitionBiometricsImage Classification
The goal of a network-based intrusion detection system (IDS) is to identify malicious behaviour that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise... more
    • by 
    •   15  
      Computer NetworksStochastic processesLearningUncertainty
    • by 
    •   15  
      Image ProcessingPattern RecognitionNeural NetworkDatabases
The goal of a network-based intrusion detection system (IDS) is to identify malicious behaviour that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise... more
    • by  and +1
    •   15  
      Computer NetworksStochastic processesLearningUncertainty
ABSTRACT Signatures are imperative biometric attributes of humans that have long been used for authorization purposes. Most organizations primarily focus on the visual appearance of the signature for verification purposes. Many documents,... more
    • by 
    •   12  
      Computer ScienceNeural NetworkArtificial Neural NetworksFeature Extraction
    • by 
    •   6  
      Electrical EngineeringPeriodogramSignature RecognitionSignature Analysis
The goal of a network-based intrusion detection system (IDS) is to identify malicious behaviour that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise... more
    • by 
    •   15  
      Computer NetworksStochastic processesLearningUncertainty
    • by 
    •   15  
      Information SystemsCognitive ScienceUsabilityEvaluation
The goal of a network-based intrusion detection system (IDS) is to identify malicious behaviour that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise... more
    • by 
    •   15  
      Computer NetworksStochastic processesLearningUncertainty
This paper presents a diagnostic analytics of harmonic source signature recognition of rectifier and inverter-based load in the distribution system with single-point measurement at the point of common coupling by utilizing Periodogram.... more
    • by  and +1
    •   6  
      Electrical EngineeringPeriodogramSignature RecognitionSignature Analysis
    • by 
    •   11  
      Computer ScienceImage ProcessingPattern RecognitionWriting