N. S. Nourabadi, K. G. Dizaji, and S. A. Seyyedsalehi. “Face pose normalization for identity recognition using 3D information by means of neural networks,” 5th Conference on Information and Knowledge Technology, 2013, pp. 432 – 437, doi: 10.1109/IKT.2013.6620106.10.1109/IKT.2013.6620106
C. Ching-Kun, L. Chun-Liang, L. Shyan-Lung Lin, C. Yen-Ming, and C. Cheng-Tang. “A Chaotic Theorectical Approach to ECG-Based Identity Recognition,” IEEE Computational Intelligence Magazine, 2014, vol. 9, pp. 53 – 63, doi: 10.1109/MCI.2013.2291691.10.1109/MCI.2013.2291691
L. Jiwen Lu, W. Gang Wang, and P. Moulin. “Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 51 – 61, doi: 10.1109/TIFS.2013.2291969.10.1109/TIFS.2013.2291969
L. Feng Liu, D. Zhang and G. Zhenhua. “Distal-Interphalangeal-Crease-Based User Authentication System,” IEEE Transactions on Information Forensics and Security, 2013, vol. 8, pp. 1446 – 1455, doi: 10.1109/TIFS.2013.2272787.10.1109/TIFS.2013.2272787
M. S. Umar and M. Q. Rafiq. “Select-to-Spawn: A novel recognition-based graphical user authentication scheme,” 2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, pp. 1 – 5, doi: 10.1109/ISPCC.2012.6224382.10.1109/ISPCC.2012.6224382
A. Drosou, D. Tzovaras, K. Moustakas, and M. Petrou. “Systematic Error Analysis for the Enhancement of Biometric Systems Using Soft Biometrics,” IEEE Signal Processing Letters, 2012, vol. 19, pp. 833 – 836, doi: 10.1109/LSP.2012.2221701.10.1109/LSP.2012.2221701
P. Tsai, M. K. Khan, J. Pan, and B, Liao. “Interactive Artificial Bee Colony Supported Passive Continuous Authentication System,” Systems Journal, 2014, pp. 395 – 405, doi: 10.1109/JSYST.2012.22 08153.
N. Erdogmus, N and J. L. Dugelay. “3D Assisted Face Recognition: Dealing With Expression Variations,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 826 – 838, doi: 10.1109/TIFS.2014.2309851.10.1109/TIFS.2014.2309851
S. J. Elliott, S. A. Massie, and M. J. Sutton. “The Perception of Biometric Technology: A Survey,” 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007, pp. 259 – 264, doi: 10.1109/AUTOID.2007.380630.10.1109/AUTOID.2007.380630
R. A. Rashid, N. H. Mahalin, M. A. Sarijari, and A. A. Abdul. “Security system using biometric technology: Design and implementation of Voice Recognition System (VRS),” International Conference on Computer and Communication Engineering, 2008, pp. 898 – 902, doi: 10.1109/ICCCE.2008.4580735.10.1109/ICCCE.2008.4580735
L. Simon and M. Silverman. “A practical guide to biometric security technology,” IT Professional, 2001, vol. 3, pp. 27 – 32, doi: 10.1109 /6294.899930.10.1109/6294.899930
D. C. Leonard, A. P. Pons, and S. S. Asfour. “Realization of a Universal Patient Identifier for Electronic Medical Records Through Biometric Technology,” IEEE Transactions on Information Technology in Biomedicine, 2009, vol. 13, pp. 494 – 500, doi: 10.1 109/TITB.2008.926438.10.1109/TITB.2008.92643819273015
M. Zaied, O. Jemai, and C. Ben Amar. “Training of the Beta wavelet networks by the frames theory: Application to face recognition,” Workshops on Image Processing Theory, Tools and Applications, 2008, pp. 1 - 6, doi: 10.1109/IPTA.2008.4743756.10.1109/IPTA.2008.4743756
B. Knight B and A. Johnston. “The role of movement in face recognition,” IEEE Transactions on Pattern Analysisand Machine Intelligence, 1994, vol. 4, pp. 265 – 273.10.1080/713756764
T. F. Cootes, G. J. Edwards, and C. J. Taylor. “Active Appearance Models,” Proceedings of the European Conference on Computer Vision, 1998, vol. 2, pp. 484 – 498.10.1007/BFb0054760
T. Jing Yi, Y. H. Tay, and L. Phooi Yee Lau. “One-dimensional Grey-level Co-occurrence Matrices for texture classification,” International Symposium on Information Technology, 2008, vol. 3, pp. 1 – 6, doi: 10.1109/ITSIM.2008.4631992.10.1109/ITSIM.2008.4631992
A. Juraiza Ishak, M. M. Mustafa, and A. Hussain. “Gradient Field Distribution and Grey Level Co-occurrence Matrix techniques for automatic weed classification,” International Symposium on Mechatronics and Its Applications, 2008, pp. 1 – 5, doi: 10.1109/ISM A.2008.4648846.
S. A. Banday, A. H. Mir, and F. Khursheed. “Multi-unit iris biometric fusion using gray level co-occurrence matrix features,” International Conference on Advanced Electronic Systems, 2013, pp. 225 – 229, doi: 10.1109/ICAES.2013.6659397.10.1109/ICAES.2013.6659397
G.Sengupta, T.A.Win, C.Messom, S.Demidenko and S.C. Mukhopadhyay, “Defect analysis of grit-blasted or spray printed surface using vision sensing technique”, Proceedings of Image and Vision Computing NZ, Nov. 26-28, 2003, Palmerston North, pp. 18-23.
Yanmin LUO, Peizhong LIU and Minghong LIAO, AN ARTIFICIAL IMMUNE NETWORK CLUSTERING ALGORITHM FOR MANGROVES REMOTE SENSING, IMAGE,International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648
G. Sen Gupta, S.C. Mukhopadhyay, S. Demidenko and C.H. Messom, “Master-slave Control of a Teleoperated Anthropomorphic Robotic Arm with Gripping Force Sensing”, IEEE Transactions on Instrumentation and Measurement, Vol. 55, No. 6, pp. 2136-2145, December 2006.
Daode Zhang et al., RESEARCH ON CHIPS’ DEFECT EXTRACTION BASED ON IMAGE-MATCHING, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.10.21307/ijssis-2017-658