Have a personal or library account? Click to login
On Identifying Terrorists Using Their Victory Signs Cover

On Identifying Terrorists Using Their Victory Signs

Open Access
|Oct 2018

References

  1. Aldahadha, B. 2018. Disputing Irrational Beliefs Among Convicted Terrorists and Extremist Beliefs. Journal of Rational-Emotive & Cognitive-Behavior Therapy, 114. DOI: 10.1007/s10942-018-0293-7
  2. Amayeh, G, Bebis, G, Erol, A and Nicolescu, M. 2006. Peg-free hand shape verification using high order Zernike moments. New York, USA, IEEE.
  3. Amayeh, G, Bebis, G and Hussain, M. 2010. A Comparative Study of Hand Recognition Systems, 16. s.l., s.n.
  4. Aragonès, F. 2013. Visible, near infrared and thermal hand-based image biometric recognition. s.l.: s.n.
  5. Basheer, S and Robinson, M. 2013. Reduce Data Utilization Scheme for Biometric Hand Recognition using Six Features. International Journal of Scientific & Engineering Research, 4(4): 717724.
  6. Birajdar, GK and Mankar, VH. 2013. Digital image forgery detection using passive techniques: A survey. Digital Investigation, 10(3): 226245. DOI: 10.1016/j.diin.2013.04.007
  7. Bogazici-University. 2015. Hand Geometry Database and Hand-Vein Database. [Online] Available at: http://bosphorus.ee.boun.edu.tr/hand/Home.aspx [Accessed 5 12 2015].
  8. Bradbury, D. 2005. No place to hide. Digital Investigation, 2(6): 3335.
  9. Dhole, SA and Patil, VH. 2012. Person Identification Using Peg Free Hand Geometry Measurement. International journal of engineering science and technology, 4(6).
  10. Duta, N. 2009. A survey of biometric technology based on hand shape. Pattern Recognition, 42(11): 27972806. DOI: 10.1016/j.patcog.2009.02.007
  11. Dutagac, H, Sankur, B and Yoruk, E. 2008. A comparative analysis of global hand appearance-based person recognition. Journal of Electronic Imaging, 17(1): 011018/1–011018/19.
  12. Fong, S, Zhuang, Y, Fister, I and Fister, I, Jr. 2013. A biometric authentication model using hand gesture images. Biomedical engineering online, Fong, S, Zhuang, Y, Fister, I and Fister, I, Jr. (eds.), 12(111).
  13. Frank, E, Hall, MA and Witten, IH. 2016. The WEKA Workbench. Online Appendix for “Data Mining: Practical Machine Learning Tools and Techniques”. s.l.: Morgan Kaufmann.
  14. Guo, J-M, et al. 2012. Contact-free hand geometry-based identification system. Expert Systems with Applications, 39(14): 1172811736. DOI: 10.1016/j.eswa.2012.04.081
  15. Hassanat, A. 2014. Dimensionality Invariant Similarity Measure. Journal of American Science, 10(8): 22126.
  16. Hassanat, A, et al. 2015. New Mobile Phone and Webcam Hand Images Databases for Personal Authentication and Identification. Procedia Manufacturing, 3: 40604067. DOI: 10.1016/j.promfg.2015.07.977
  17. Hassanat, A, Alkasassbeh, M, Al-awadi, M and Alhasanat, E. 2015. Colour-based lips segmentation method using artificial neural networks. Amman, IEEE, 188193.
  18. Hassanat, AB, et al. 2017. Victory sign biometrie for terrorists identification: Preliminary results, 182187. Irbid, IEEE.
  19. Hassanat, AB, Alkasassbeh, M, Al-awadi, M and Alhasanat, EA. 2016. Color-based object segmentation method using artificial neural network. Simulation Modelling Practice and Theory, 64(1): 317. DOI: 10.1016/j.simpat.2016.02.011
  20. Hu, MK. 1962. Visual Pattern Recognition by Moment Invariants. IRE Trans. Info. Theory, IT-8: 179187. DOI: 10.1109/TIT.1962.1057692
  21. Kang, W and Wu, Q. 2014. Pose-Invariant Hand Shape Recognition Based on Finger Geometry. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 44(11): 15101521. DOI: 10.1109/TSMC.2014.2330551
  22. Kukula, E and Elliott, S. 2006. Implementation of hand geometry: An analysis of user perspectives and system performance. EEE Aerospace and Electronic System Magazine, 21(3): 39. DOI: 10.1109/MAES.2006.1624184
  23. Kumar, A, Wong, D, Shen, H and Jain, A. 2006. Personal authentication using hand images. Pattern Recognition Letters, 27: 14781486. DOI: 10.1016/j.patrec.2006.02.021
  24. Liao, S and Pawlak, M. 1996. On image analysis by moments. IEEE Transactions on Pattern analysis and machine intelligence, 18(3): 254266. DOI: 10.1109/34.485554
  25. Luque-Baena, R, et al. 2013. Assessment of geometric features for individual identification and verification in biometric hand systems. Expert Systems with Applications, 40(9): 35803594. DOI: 10.1016/j.eswa.2012.12.065
  26. Ma, Y, Pollick, F and Hewitt, W. 2004. Using b-spline curves for hand recognition, 274277. s.l., IEEE.
  27. Oh, S-K, Yoo, S-H and Pedrycz, W. 2013. Design of face recognition algorithm using PCA-LDA combined for hybrid data pre-processing and polynomial-based RBF neural networks: Design and its application. Expert Systems with Applications, 40(5): 14511466. DOI: 10.1016/j.eswa.2012.08.046
  28. Otsu, N. 1979. A threshold selection method from gray-level histograms. IEEE Trans. Sys., Man., Cyber., 9(1): 6266. DOI: 10.1109/TSMC.1979.4310076
  29. Pavešić, N, Ribarić, S and Ribarić, D. 2004. Personal authentication using hand-geometry and palmprint features–the state of the art. Hand, 11: 12.
  30. Sanchez-Reillo, R, Sanchez-Avila, C and Gonzalez-Marcos, A. 2000. Biometric identification through hand geometry measurements. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(10): 11681171. DOI: 10.1109/34.879796
  31. Sidlauskas, D. 1994. HAND: Give me five. IEEE Spectrum, 32(2): 2425.
  32. Sinha, A, Choi, C and Ramani, K. 2016. Deephand: Robust hand pose estimation by completing a matrix imputed with deep features, 41504158. Las Vegas, IEEE.
  33. Tarawneh, AS, Chetverikov, D and Hassanat, AB. 2018. Pilot Comparative Study of Different Deep Features for Palmprint Identification in Low-Quality Images, 16. Budapest, s.n.
  34. Varchol, P and Levicky, D. 2007. Using of hand geometry in biometric security systems. Radioengineering, 16(4): 8287.
  35. Zhang, H, Fritts, JE and Goldman, SA. 2008. Image segmentation evaluation: A survey of unsupervised methods. Computer vision and image understanding, 110(2): 260280. DOI: 10.1016/j.cviu.2007.08.003
  36. Zhao, W, et al. 1998. Discriminant Analysis of Principal Components for Face Recognition. In: Face Recognition, 7385. Berlin: Springer. DOI: 10.1007/978-3-642-72201-1_4
Language: English
Submitted on: May 8, 2018
|
Accepted on: Oct 1, 2018
|
Published on: Oct 15, 2018
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2018 Ahmad B. A. Hassanat, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.