![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessToward explainable heat load patterns prediction for district heating
Heat networks play a vital role in the energy sector by offering thermal energy to residents in certain countries. Effective management and optimization of heat networks require a deep understanding of users' ...
-
Article
Open AccessAuthor Correction: Daily and seasonal heat usage patterns analysis in heat networks
-
Article
Open AccessDaily and seasonal heat usage patterns analysis in heat networks
Heat usage patterns, which are greatly affected by the users' behaviors, network performances, and control logic, are a crucial indicator of the effective and efficient management of district heating networks....
-
Article
Smartphone-based bulky waste classification using convolutional neural networks
The rapid urbanization process is escalating the urban waste problem, and ineffective management has worsened the issue, leading to severe consequences to the population health and economy. Although many count...
-
Article
Background Information of Deep Learning for Structural Engineering
Since the first journal article on structural engineering applications of neural networks (NN) was published, there have been a large number of articles about structural analysis and design problems using mach...
-
Chapter and Conference Paper
3D Face Representation Using Inverse Compositional Image Alignment for Multimodal Face Recognition
A 3D model based approach for a face representation and recognition algorithm has been investigated as a robust solution for pose and illumination variation compared to 2D face recognition system. However, a 3...
-
Chapter and Conference Paper
Face Recognition Technology for Ubiquitous Computing Environment
In this paper, we explore face detection and face recognition algorithms for ubiquitous computing environment. We develop algorithms for application programming interface (API) suitable for embedded system. Th...
-
Chapter and Conference Paper
Biometric User Authentication Based on 3D Face Recognition Under Ubiquitous Computing Environment
In this paper, we developed a biometric user authentication system based on 3-dimensional (3D) face recognition under ubiquitous computing environment. Since 2D based face recognition has been shown its struct...
-
Chapter and Conference Paper
Knowledge-Based User Authentication Associated with Biometrics
User authentication is necessary for proving and verifying the claimed identity of users in a distributed environment. Three factors such as user’s knowledge, belongings, and biometric traits are usually consi...
-
Chapter and Conference Paper
Biometric Person Authentication for Access Control Scenario Based on Face Recognition
There are tremendous need increase for personal verification and identification in internet security, electronic commerce and access control in recent years. Also, as the demands for security in many applicati...
-
Chapter and Conference Paper
Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications
In this paper we developed driver authentication system based on face recognition. Since 2D based face recognition has been shown its structural limitation, 3D model based approach for face recognition has bee...
-
Chapter and Conference Paper
Face Representation Method Using Pixel-to-Vertex Map (PVM) for 3D Model Based Face Recognition
3D model based approach for face recognition has been spotlighted as a robust solution under variant conditions of pose and illumination. Since a generative 3D face model consists of a large number of vertices...
-
Chapter and Conference Paper
System Design and Assessment Methodology for Face Recognition Algorithms
For biometric person authentication, system design and assessment methodology form essential part of the entire process. We design a performance evaluation methodology for face recognition system based on iden...
-
Chapter and Conference Paper
Multi-modal Biometrics with PKIs for Border Control Applications
In this paper, we present a simple model that enables a low-cost but highly-scalable method for national border control applications. The proposed model could allow combining multi-modal biometrics with public...
-
Chapter and Conference Paper
Multi-modal Techniques for Identity Theft Prevention
The rapid growth of the Internet has caused a large number of social problems including invasion of privacy and violation of personal identity. Currently, it is an emerging trend to verify personal identity ba...
-
Chapter and Conference Paper
Multi-modal Biometrics with PKI Technologies for Border Control Applications
It is widely recognized that multi-modal biometrics has the potential to strengthen border protection by reducing the risk of passport fraud. However, it may take high costs to issue smart-card enabled passpor...
-
Chapter and Conference Paper
Biometrics Identification and Verification Using Projection-Based Face Recognition System
Over the last several years, numerous biometrics algorithms have been investigated for face, fingerprints, iris, and voice reocognition applications. For face recognition research, projection-based face recogn...
-
Chapter and Conference Paper
Biometrics Person Authentication Using Projection-Based Face Recognition System in Verification Scenario
There are tremendous need for personal verification and identification in internet security, electronic commerce and access control in recent years. Also, as the demands for security in many applications such ...
-
Chapter
The FERET Evaluation
Two of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technolog...
-
Chapter and Conference Paper
The FERET September 1996 database and evaluation procedure
Two of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (...