This paper proves that in iris recognition, the concepts of sheep, goats, lambs and wolves-as proposed by Doddington and Yager in the so-called Biometric Menagerie, are at most fuzzy and at least not quite well define...
详细信息
作者:
Clements-Croome, DerekComputer Science Department
Escuela Politecnica Superior Universidad Autonoma de Madrid C/Francisco Tomás y Valiente 28049 Madrid Spain Software Engineering Department
Faculty of Automatics Computers and Electronics University of Craiova Bvd. Decebal 107 200440 Craiova Romania Applied Research Laboratory
Information Science and Technology Division Pennsylvania State University 204 V Applied Science Building University Park PA 16802 United States Systems Engineering Section
Faculty of Technology Policy and Management Delft University of Technology Jaffalaan 5 2628BX Delft Netherlands
Click to increase image sizeClick to decrease image size
Click to increase image sizeClick to decrease image size
In this paper we solve the problem of domain pool classification in fractal volume coding using all symmetries of a cube. Using the algorithms described in the article we are able to perform useful Domain-Range compar...
详细信息
ISBN:
(纸本)9781612081953
In this paper we solve the problem of domain pool classification in fractal volume coding using all symmetries of a cube. Using the algorithms described in the article we are able to perform useful Domain-Range comparisons and achieve better compression rates while not loosing fidelity. In this paper we take advantage of the symmetric permutation group of cube and decrease the number of classes (from 10080 to 840). The same transformations are used in the compression and so we will have a better approximation of the final compressed volume. This paper represents a work in progress so no experimental results can be provided at this time.
In this paper we present a graph-based volumetric data segmentation method based on a 3D hexagonal prismatic lattice. We evaluate the advantages and disadvantages of using this lattice in contrast with classic ones. O...
详细信息
ISBN:
(纸本)9781467307086
In this paper we present a graph-based volumetric data segmentation method based on a 3D hexagonal prismatic lattice. We evaluate the advantages and disadvantages of using this lattice in contrast with classic ones. One of the main advantages are high isoperimetric quotient, near equidistant neighbours (ability to represent curves better, resulting in a better segmentation) and high connectivity. Disadvantages are due to the main stream lack of interest in this area and thus data sets must be converted back and forth from rectangular to hexagonal latices both in acquisition and visualization processes.
Current technology has made possible to scan volumes with ease and thus huge amount of data is generated. Devising algorithms to efficiently store and index this data is an open challenge. In this article we propose a...
详细信息
作者:
[Systems Research Institute
Polish Academy of Sciences Warsaw and University of Gdansk Warsaw Poland Systems Research Institute
Polish Academy of Sciences Warsaw and Management Academy Warsaw Poland Software Engineering Department
Faculty of Automatics Computers and Electronics University of Craiova Bvd.Decebal Craiova Romania University of Duisburg-Essen
Institute for Computer Science and Business Information Systems (ICB) Practical Computer Science Data Management Systems and Knowledge Representation Essen Germany
Current technology has made possible to scan volumes with ease and thus huge amount of data is generated. Devising algorithms to efficiently store and index this data is an open challenge. In this article we propose a...
详细信息
Current technology has made possible to scan volumes with ease and thus huge amount of data is generated. Devising algorithms to efficiently store and index this data is an open challenge. In this article we propose a theoretical approach to volume indexing by extending the idea of using fractal compression to index images, to the third dimension. The described technique uses a classification method that greatly improve the exponential complexity of the volume fractal coding. The compressed volume can then be used to be indexed in a digital library in a more efficient way. Then, content-based similarity queries can take full advantage of the self-similarity property of fractals. All these features will be present in an application that is currently under development.
The paper is oriented toward systems, network, and security administrators with some degree networking experience who are looking to expand their knowledge of networking solutions as a mean of informing their approach...
详细信息
ISBN:
(纸本)9789604741144
The paper is oriented toward systems, network, and security administrators with some degree networking experience who are looking to expand their knowledge of networking solutions as a mean of informing their approach to Virtual Private Networks (VPNs), Multi Protocol Label Switching (MPLS) and MPLS VPNs. This orientation makes for a fairly broad audience and is reflected in the breadth of the material presented.
Security has become the forefront of network management and implementation. The challenge in the security issue is to find a well balanced situation between two of the most important requirements: the need of developi...
详细信息
ISBN:
(纸本)9789604741144
Security has become the forefront of network management and implementation. The challenge in the security issue is to find a well balanced situation between two of the most important requirements: the need of developing networks in order to sustain the evolving business opportunities and work level, and the need to protect classified, private and in some cases even strategic information. The application of an effective security policy is the most important step that an institution can take to protect its network. Networks have grown in both size and importance in a very short period of time. If the security is compromised, there could be serious consequences starting from theft of information, loss of privacy and reaching even bankruptcy of that institution. The types of potential threats to network are continuously evolving and must be at least theoretical known in order to fight them back, as the rise of wireless networks implies that the security solution become seamlessly integrated, more flexible.
暂无评论