Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- digital signature 2 Treffer
- applications 1 Treffer
- back propagation 1 Treffer
- bagging 1 Treffer
- biometric techniques 1 Treffer
-
21 weitere Werte:
- discrete cosine transform 1 Treffer
- discriminant analysis 1 Treffer
- elliptic curve cryptography 1 Treffer
- e-passport 1 Treffer
- face recognition 1 Treffer
- gesture recognition 1 Treffer
- image retrieval 1 Treffer
- iris 1 Treffer
- large-scale 1 Treffer
- linear discriminant analysis 1 Treffer
- multi-feature 1 Treffer
- neural network 1 Treffer
- normalisation 1 Treffer
- offline signature 1 Treffer
- radial basis function 1 Treffer
- recognition system 1 Treffer
- segmentation 1 Treffer
- semantic parsing 1 Treffer
- support vector machine (svm) 1 Treffer
- svm 1 Treffer
- tf-idf 1 Treffer
Sprache
Inhaltsanbieter
10 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 45-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 23-28academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 121-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 139-154academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 141-150academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 347-366academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 253-264academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-01-30), Heft 1, S. 147-158academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 217-222academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-07-30), Heft 3, S. 23-44academicJournalZugriff: