scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
Proceedings ArticleDOI
11 Nov 2010
47 Citations
The developed ear detection system is very fast and can be used in a real-time surveillance scenario.
Open accessBook ChapterDOI
Mina Ibrahim, Mark S. Nixon, Sasan Mahmoodi 
29 Nov 2010
7 Citations
This ear detection technique is fully automated, has encouraging performance and appears to be robust to degradation by noise.
Open accessProceedings ArticleDOI
07 Nov 2009
22 Citations
Ear detection results are found to be very good and speak for the efficiency and robustness of the technique.
Open accessJournal ArticleDOI
Li Yuan, Zhichun Mu 
21 Citations
Experimental results of ear recognition on two datasets (USTB and UND datasets) and the performance of the ear authentication system show the feasibility and effectiveness of the proposed approach.
The results suggest that this method can be developed for improved clinical detection of middle ear infection.
Proceedings ArticleDOI
Wen-Jing Li, Zhi-Chun Mu 
31 Oct 2008
37 Citations
The third contribution is we designed an ear detection system of DSP and gained a good result of practical application.
Proceedings ArticleDOI
Ajay Kumar, Ajay Kumar, David Zhang 
09 Apr 2007
32 Citations
Our experiments on two different public ear databases achieve promising results and suggest its utility in ear-based authentication.
achieved using the proposed method on publicly available ear database are up to 97.77% which show encouraging performance.
The experimental results carried out on 700 ear images confirm the utility of the proposed approach.

See what other people are reading

Which is the best eeg Motor Imagery frequency?
5 answers
How can the measrment of BPD and HC determine the fetal development?
5 answers
How does the mean spectrogram bar graph of a voiceprint aid in diagnosing hydraulic pump faults?
5 answers
What are the most common features used to determine context in hearing devices?
5 answers
Why traditional door security system is not safe?
5 answers
Why traditional door security system is not safe?
5 answers
Issues in english fluency
5 answers
English fluency issues among university students are multifaceted. Factors contributing to poor fluency include under-qualified teachers, inadequate teaching materials, lack of speaking opportunities, fear of making mistakes, grammar deficiencies, and low confidence. Additionally, challenges stem from vocabulary limitations, anxiety, lack of motivation, learning environment, teaching strategies, self-confidence, and age. To address these issues, solutions such as improving grammar, increasing vocabulary, boosting confidence, enhancing pronunciation, employing communicative approaches, and prioritizing fluency over accuracy have been suggested. Incorporating oral fluency courses in the curriculum, utilizing audio-visual aids, and providing more speaking opportunities inside the classroom are also recommended. Efforts to enhance English fluency involve a combination of pedagogical adjustments, teacher training, and student engagement strategies.
What are the current advancements in automatic modulation classification techniques?
5 answers
Recent advancements in automatic modulation classification (AMC) techniques include the utilization of meta-learning methods for few-shot AMC with distribution bias. Additionally, the integration of Deep Learning (DL) algorithms, such as standalone RNN and a combination of Convolutional Neural Network (CNN) with Long Short-Term Memory (LSTM), has shown promising results in accurately classifying wireless signals. Moreover, the application of deep residual neural networks with masked modeling (DRMM) has been proposed to enhance AMC performance, particularly in scenarios with limited signal samples and low signal-to-noise ratio (SNR). These advancements aim to address challenges in signal classification, improve generalization abilities, and enhance the accuracy of modulation identification in various communication environments.
What are alternatives to Frangi filter?
5 answers
Alternative methods to the Frangi filter for vessel enhancement include the Local-Sensitive Connectivity Filter (LS-CF), a pre-weighted neural network called Frangi-Net, a novel enhancement filter based on the ratio of multiscale Hessian eigenvalues, and a Hessian matrix-based multiscale tubular structure detection (TSD) algorithm adapted to 3D B-mode vascular US images. These alternatives aim to improve vessel segmentation quality, enhance vascular structures uniformly, and accurately distinguish centerline points in different types of medical image datasets. The LS-CF outperformed state-of-the-art approaches in various multimodal datasets, while the Frangi-Net showed qualitative and quantitative improvements in segmentation quality. The proposed enhancement filter based on Hessian eigenvalues achieved the best scores in segmentation performance metrics, and the TSD algorithm designed for vascular US images performed significantly better than the Frangi Filter on 3D US carotid datasets.
What are the results and limitations from wahab et al., A Survey of Biometrics Security System?
4 answers
Wahab et al.'s survey on biometric security systems highlights the advantages and challenges associated with biometric authentication. The results emphasize the enhanced security, reliability, and user convenience offered by biometric systems compared to traditional methods. However, the study also identifies limitations such as privacy concerns, potential false positives or negatives, and inherent disadvantages that restrict the widespread adoption of biometrics. Despite these obstacles, the survey underscores the promising future of biometrics, especially in overcoming security vulnerabilities present in traditional authentication methods. Continuous development in multi-factor biometric authentication is recognized as a mainstream trend, indicating ongoing efforts to address the identified challenges and further improve biometric security systems.
What are the potential limitations and challenges in implementing Cockell and Halak's (2020) biometric authentication system?
4 answers
Cockell and Halak's (2020) biometric authentication system may face challenges such as privacy concerns, false positives or negatives, user interaction requirements, and stability over time. Implementing biometric security also requires attention to flaws, user approval, and acceptability elements like social, organizational, and cost considerations. Additionally, the integration of new sensors in IoT devices for biometric authentication introduces challenges related to opportunistic data types and their combinations with existing biometrics, impacting continuous adaptability and security in cyber-physical spaces. Despite advancements in biometric technology enhancing authentication processes, there are still limitations in terms of robustness, user acceptance, and adaptability to evolving security threats and user needs.