Many-core scaling now faces a power wall. The gap between the number of cores that fit on a die and the number that can operate simultaneously under the power budget is rapidly i...
This paper details a fully automated face authentication system using low-cost near infrared imaging. The image normalization step consists of eye center localization, scale corre...
In a variety of applications (including automatic target recognition) image classification algorithms operate on compressed image data. This paper explores the design of optimal t...
Deformations in handwritten characters have classdependent tendencies. For example, characters of class “A” are often deformed by global slant transformation and never deforme...
Seiichi Uchida, Mohammad Asad Ronee, Hiroaki Sakoe
IT organizations are facing significant business and technical challenges today. On the business realm, companies are increasingly outsourcing their IT operations to specialized I...
Santhosh Kumaran, Tian Chao, Kamal Bhattacharya, P...