Dense Hand-CNN: A Novel CNN Architecture based on Later Fusion of Neural and Wavelet Features for Identity Recognition
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Biometric recognition or biometrics has emerged as the best solution for criminal identification and access control applications where resources or information need to be protected from unauthorized access. Biometric traits such as fingerprint, face, palmprint, iris, and hand-geometry have been well explored; and matured approaches are available in order to perform personal identification. The work emphasizes the opportunities for obtaining texture information from a palmprint on the basis of such descriptors as Curvelet, Wavelet, Wave Atom, SIFT, Gabor, LBP, and AlexNet. The key contribution is the application of mode voting method for accurate identification of a person at the fusion decision level. The proposed approach was tested in a number of experiments at the CASIA and IITD palmprint databases. The testing yielded positive results supporting the utilization of the described voting technique for human recognition purposes.
Authors and Affiliations
Elaraby A. Elgallad, Wael Ouarda, Adel M. Alimi
A Prediction-based Curriculum Analysis using the Modified Artificial Bee Colony Algorithm
Due to the vast amount of students’ information and the need of quick retrieval, establishing databases is one of the top lists of the IT infrastructure in learning institutions. However, most of these institutions do no...
Threshold Based Penalty Functions for Constrained Multiobjective Optimization
This paper compares the performance of our re-cently proposed threshold based penalty function against its dynamic and adaptive variants. These penalty functions are incorporated in the update and replacement scheme of t...
Modeling Ant Colony Optimization for Multi-Agent based Intelligent Transportation System
This paper focuses on Sumo Urban Mobility Simulation (SUMO) and real-time Traffic Management System (TMS) simulation for evaluation, management, and design of Intelligent Transportation Systems (ITS). Such simulations ar...
Implementation of ISS - IHAS (Information Security System-Information Hiding in Audio Signal) model with reference to proposed e-cipher Method
This paper shows the possibility of exploiting the features of E- cipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed...
Factors Influencing Users’ Intentions to Use Mobile Government Applications in Saudi Arabia: TAM Applicability
M-government applications in Saudi Arabia are still at an early stage. In this study, a modified technology acceptance model (TAM) was used to identify and measure the factors that influence users’ intentions to use m-go...