Author of the publication

Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach.

, , , and . Neural Processing Letters, 26 (3): 201-216 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving a neural network using dyadic connections., , and . IJCNN, page 1019-1025. IEEE, (2008)State detection from electromyographic signals towards the control of prosthetic limbs., , and . UKCI, page 120-127. IEEE, (2013)Application of Fuzzy Logic in Computer Security and Forensics., , and . Computational Intelligence for Privacy and Security, volume 394 of Studies in Computational Intelligence, Springer, (2012)Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms., , , and . IJPRAI, (2013)Choice effect of linear separability testing methods on constructive neural network algorithms: An empirical study., , and . Expert Syst. Appl., 38 (3): 2330-2346 (2011)A fuzzy genetic programming-based algorithm for subgroup discovery and the application to one problem of pathogenesis of acute sore throat conditions in humans., , , , , , and . Inf. Sci., (2015)Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach., , , and . Neural Processing Letters, 26 (3): 201-216 (2007)The recursive deterministic perceptron neural network., and . Neural Networks, 11 (9): 1571-1588 (1998)Analysis and test of efficient methods for building recursive deterministic perceptron neural networks., , , , and . Neural Networks, 20 (10): 1095-1108 (2007)On the Generalization of the m-Class RDP Neural Network., , and . ICANN (2), volume 5164 of Lecture Notes in Computer Science, page 734-743. Springer, (2008)