Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- 3D Delaunay triangulation (1)
- Authentication (1)
- Cnn (1)
- Convolutional neural networks (1)
- Cyber security (1)
-
- Database systems (1)
- Dcnn (1)
- Deep convolutional neural networks (1)
- Deep learning (1)
- Delau-nay triangulations (1)
- Discrimination ability (1)
- Entropy (1)
- Face recognition (1)
- Feature extraction (1)
- Feature representation (1)
- Feature similarities (1)
- Fingerprint authentication (1)
- Fingerprint authentication system (1)
- Fingerprint matching (1)
- Graphic methods (1)
- Human-robot collaboration (1)
- Image analysis (1)
- Information theoretic measure (1)
- Information theory (1)
- Internet of Things (IOT) (1)
- Internet of things (1)
- Local government (1)
- Local pixel features (1)
- Matching performance (1)
- Mobile security (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Research outputs 2014 to 2021
For robots to attain more general-purpose utility, grasping is a necessary skill to master. Such general-purpose robots may use their perception abilities to visually identify grasps for a given object. A grasp describes how a robotic end-effector can be arranged to securely grab an object and successfully lift it without slippage. Traditionally, grasp detection requires expert human knowledge to analytically form the task-specific algorithm, but this is an arduous and time-consuming approach. During the last five years, deep learning methods have enabled significant advancements in robotic vision, natural language processing, and automated driving applications. The successful results of these methods …
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
An Entropy-Histogram Approach For Image Similarity And Face Recognition, Mohammed Aljanabi, Zahir Hussain, Song F. Lu
An Entropy-Histogram Approach For Image Similarity And Face Recognition, Mohammed Aljanabi, Zahir Hussain, Song F. Lu
Research outputs 2014 to 2021
Image similarity and image recognition are modern and rapidly growing technologies because of their wide use in the field of digital image processing. It is possible to recognize the face image of a specific person by finding the similarity between the images of the same person face and this is what we will address in detail in this paper. In this paper, we designed two new measures for image similarity and image recognition simultaneously. The proposed measures are based mainly on a combination of information theory and joint histogram. Information theory has a high capability to predict the relationship between …
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
Research outputs 2014 to 2021
Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …