The Finger-Knuckle-Print Recognition Using the Kernel Principal Components Analysis and the Support Vector Machines

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:MISC (4. : 2016 : Constantine, Algerien) Modelling and implementation of complex systems
1. Verfasser: Khellat-Kihel, S. (VerfasserIn)
Weitere Verfasser: Abrishambaf, R. (VerfasserIn), Cabral, J. (VerfasserIn), Monteiro, J. L. (VerfasserIn), Benyettou, M. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2016
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
The Finger-Knuckle-Print Recognition Using the Kernel Principal Components Analysis and the Support Vector Machines 2016 Khellat-Kihel, S.
Cloud Simulation Model Based on Large Numbers Law for Evaluating Fault Tolerance Approaches 2016 Hannache, Oussama
A Pairwise Approach for Model Merging 2016 Boubakir, Mohammed
Palmprint Image Quality Measurement Algorithm 2016 Guerrache, Fares
Realization of Gymnastic Movements on the Bar by Humanoid Robot Using a New Selfish Gene Algorithm 2016 Tighzert, Lyes
A Novel Bio Inspired Algorithm Based on Echolocation Mechanism of Bats for Seismic Hazards Detection 2016 Rahmani, Mohamed Flhadi
Improving the Method of Wrist Localization Local Minimum-Based for Hand Detection 2016 Medjram, Sofiane
A Proposal for Shared VMs Management in IaaS Clouds 2016 Makhlouf, Sid Ahmed
Two Stages Feature Selection Based on Filter Ranking Methods and SVMRFE on Medical Applications 2016 Djellali, Hayet
A Locally Sequential Globally Asynchronous Net from Maximality-Based Labelled Transition System 2016 Benamira, Adel
Enhanced Chemical Reaction Optimization for Multi-objective Traveling Salesman Problem 2016 Bouzoubia, Samira
Clustering to Enhance Case-Based Reasoning 2016 Mansoul, Abdelhak
An Intelligent Management of Lighting in an Ambient Environment with a Multi-agent System 2016 Chaib, Aouatef
Towards an Inter-organizational Collaboration Network Characterization 2016 Semar-Bitah, Kahina
Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things 2016 Sahraoui, Somia
A Formal Approach for Maintainability and Availability Assessment Using Probabilistic Model Checking 2016 Baouya, Abdelhakim
A Review on Different Image Encryption Approaches 2016 Souyah, Amina
Reduction of Solution Space in the Automotive Safety Integrity Levels Allocation Problem 2016 Gheraibia, Youcef
Bioinspired Inference System for Medical Image Segmentation 2016 Zouaoui, Hakima
Adaptive Cuckoo Search Algorithm for the Bin Packing Problem 2016 Zendaoui, Zakaria
Alle Artikel auflisten