Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- image processing 2 Treffer
- algorithm optimization 1 Treffer
- artificial neural network 1 Treffer
- biometric 1 Treffer
- biometric authentication 1 Treffer
-
16 weitere Werte:
- centrality measure 1 Treffer
- cloud robotics 1 Treffer
- discrete cosine transform 1 Treffer
- discriminant analysis 1 Treffer
- eigenface 1 Treffer
- expectation maximization 1 Treffer
- face detection 1 Treffer
- feature extraction 1 Treffer
- finger vein recognition 1 Treffer
- gabor feature 1 Treffer
- local directional pattern 1 Treffer
- modified census transform 1 Treffer
- pattern recognition 1 Treffer
- pie 1 Treffer
- security 1 Treffer
- voice recognition 1 Treffer
Sprache
Inhaltsanbieter
9 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 369-376academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 81-100academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 187-200academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 79-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 253-264academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 303-308academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-03-30), Heft 2, S. 191-200academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 293-298academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 321-328academicJournalZugriff: