The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, a proposed hybrid dragonfly algorithm (DA) with extreme learning machine (ELM) system for prediction problem is presented. ELM model is considered a promising method for data regression and classification problems. It has fast training advantage, but it always requires a huge number of nodes in the hidden layer. The usage of a large number of nodes in the hidden layer increases the test/evaluation...
What if the data gets bigger and bigger? What if handling such huge amount of data started to be critically irritating and need much more attention? These questions became very concerning nowadays. Several organizations and industrial businesses are in need of information system and strategic organizational tool to easily handle huge data and learn the behavior of these data. In this study we proposed...
Biometrics have lately been receiving attention in popular media. Biometrics deal with identification and verification of individuals based on their behavioral or physiological characteristics. Biometrics will become one of the most important ways of the identification technology. Ear recognition might be a good solution since ear is visible, ear images are easy to be taken, and the ear structure...
Diagnosis of breast cancer analysis disease becomes one of an open discussion and a crucial need in Egypt. The analysis of these datasets for patients is important for the early detection and prediction of the disease. The usage of case-based reasoning (CBR) systems and the machine learning techniques provides us with several techniques to easily decide whether the patient is healthy or not. In this...
The biometrics recognition has been paid more attention by people with the advancement of technology nowadays. The human ear is a perfect source of data for passive person identification. Ear seems to be a good candidate solution since ear is visible, their images are easy to take and structure of ear does not change radically over time. Ear satisfies biometric characteristic (universality, distinctiveness,...
Cloud computing is the concept of using maximum remote services through a network using various minimum resources, it provides these resources to users via internet. There are many critical problems appeared with cloud computing such as data privacy, security, and reliability etc. But we find that security is the most important between these problems. In this research paper, the proposed approach...
In this paper, we present a robust image watermarking approach to hide DNA sequence data into fingerprint templates for copyright protection based on the discrete wavelet transform. A multi-bit watermark, based on DNA data, is embedded into the low frequency sub-band of the fingerprint image. During the inverse process, we employ DNA decoding to extract the image signature from the watermarked image...
In this paper, Kekre's transform is proposed for protecting fingerprint template and a symmetric bio-hash function is used to improve the protection of the fingerprint biometric template. In the proposed approach; firstly the principal curve approach is used to extract the features from the fingerprint template. Then, we applied a transformation phase using Kekre's transform. It starts by calculating...
Privacy and Security has become an increasingly serious ýproblem for any biometric systems. Template protection, ýwhich mainly prevents from data loss and hacking the stored ýtemplates, is one of the most important issues when considering ýprivacy and security. Cancelable biometrics approach Scheme ýhas been proposed to address this problem. On the other hand ýthe symmetric hash functions might be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.