參考文獻 |
[1] 中華民國內政部移民署. 入出國自動查驗通關系統. [Online]. http://www.immigration.gov.tw/lp.asp?ctNode=36092&CtUnit=19627&BaseDSD=7&mp=1
[2] Biometrics Overview. [Online]. http://www.biometrics.gov/
[3] University of Toronto. (2011, May) A Global Overview Of Digital Wallet Technologies. [Online]. http://propid.ischool.utoronto.ca/digiwallet_overview
[4] Hailong Jia, Kun Cao, "The research on the preprocessing algorithm for fingerprint image," Electrical & Electronics Engineering (EEESYM), pp. 163-166, June 2012.
[5] Roli Bansal, Priti Sehgal and Punam Bedi, "Minutiae Extraction from Fingerprint Images - a Review," IJCSI International Journal of Computer Science Issues, vol. 8, no. 3, Sep. 2011.
[6] Jain, A.K. Prabhakar, S. Hong, L. and Pankanti, S, "Filterbank-based fingerprint matching - Image Processing," IEEE Transactions on, vol. 9, pp. 846-859, May 2000.
[7] Oltmans, E., van Diessan, R.J. , van Wijngaarden, H., "Preservation functionality in a digital archive," Digital Libraries, 2004. Proceedings of the 2004 Joint ACM/IEEE Conference on, pp. 279-286, June 2004.
[8] X. Cheng, A. Bradley and L. N. Thibos, "Predicting subjective judgment of best focus with objective image quality metrics," Journal of Vision(2004), pp. 279-286, Apr. 2004.
[9] Ramesh Jain, Rangachar Kasturi, Brian G. Schunck, MACHINE VISION.: McGraw-Hill, Inc., 1995.
[10] National Institute of Standards and Technology. [Online]. http://www.nist.gov/
[11] Biometric Quality. [Online]. http://www.nist.gov/itl/iad/ig/bio_quality.cfm
[12] FVC2006: the Fourth International Fingerprint Verification Competition. [Online]. http://bias.csr.unibo.it/fvc2006/
[13] J.L. Blue and P.J. Grother, "Training feed forward networks using conjugate gradients," NISTIR 4776 and in Conference on Character Recognition and Digitizer technologies, vol. 1661, pp. 179-190, Feb. 1992.
[14] D. Liu and J. Nocedal, "On the limited memory BFGS method for large scale optimization," Imathematical programming B, no. 45, pp. 503-528, 1989.
[15] O.M. Omidvar and C. L. Wilson, "Information content in neural net optimization," NISTIR 4766, and in Journal of connection science, vol. 6, pp. 91-103, 1993.
[16] Zhan Shuanghuan, Zhang Hongbin, Image Texture Energy-Entropy-Based Blind Steganalysis., 2007.
[17] A. Gebejes, R. Huertas, Texture Characterization based on Grey-Level Co-occurrence Matrix., 2007.
[18] M. Farrokhrooz, A performance comparison between Conventional PNN and Multi-spread PNN in ship noise classification., 2006.
[19] Jing Peng, On Parzen windows classifiers., 2014.
[20] H. Chen, C. M. Kuo, C. Y. Chen, and J. H. Dai, "The design and synthesis using hierarchical robotic discrete-event modeling," Journal of Vibration and Control, vol. 19, pp. 1603-1613, 2013.
[21] H. Chen, T. K. Yao, J. H. Dai and C. Y. Chen, "A pipelined multiprocessor SOC design methodology for streaming signal processing," Journal of Vibration and Control, vol. 20, pp. 163-178, 2014.
[22] R. J. Mayer, IDEF0 Function Modeling.: Air force Systems Command.
[23] GTS-511E2. [Online]. http://www.adh-tech.com.tw/?33,gts-511e2
[24] FingerCell. [Online]. http://fingerprint-it.com/_sol_Fingercell.html
[25] Mohan Sridharan, Bayesian Methods for Data Analysis in Software Engineering., 2010. |