致词 发表于 2025-3-30 08:18:42
http://reply.papertrans.cn/19/1882/188192/188192_51.pngN斯巴达人 发表于 2025-3-30 15:11:13
http://reply.papertrans.cn/19/1882/188192/188192_52.png工作 发表于 2025-3-30 17:03:03
http://reply.papertrans.cn/19/1882/188192/188192_53.png联想记忆 发表于 2025-3-31 00:30:13
http://reply.papertrans.cn/19/1882/188192/188192_54.pngCarcinogenesis 发表于 2025-3-31 01:50:13
http://reply.papertrans.cn/19/1882/188192/188192_55.png冲突 发表于 2025-3-31 09:04:07
Some Unusual Experiments with PCA-Based Palmprint and Face Recognition influence of different training sets used for the construction of the eigenpalm and eigenface spaces on the recognition efficiency of biometric systems. The results of the recognition experiments, obtained using three palmprint databases (PolyU, FER1, FER2) and one face database (XM2VTSDB), suggestpulse-pressure 发表于 2025-3-31 09:13:58
http://reply.papertrans.cn/19/1882/188192/188192_57.pngsparse 发表于 2025-3-31 15:25:24
Promoting Diversity in Gaussian Mixture Ensembles: An Application to Signature Verificationable classifier: a small change in the sampling of the training set will produce not a large change in the parameters of the trained classifier. Given that ensembling techniques often rely on instability of the base classifiers to produce diverse ensembles, thereby reaching better performance than i语言学 发表于 2025-3-31 19:12:10
Advanced Studies on Reproducibility of Biometric Hasheso main applications are the generation of secure biometric templates and cryptographic keys. Depending on these applications, there are different requirements with regard to possible errors. On one side, authentication performance based on biometric hashes as feature representation can be measured bFLOUR 发表于 2025-4-1 01:37:55
Additive Block Coding Schemes for Biometric Authentication with the DNA Datame person presents a name, and the scheme compares the template of this person and the template associated with the claimed person to accept or reject their identity . The templates of people stored in the DB should be protected against attacks for discovery the biometrics and attacks for success