Pattern Matching
1,865 Followers
Recent papers in Pattern Matching
This paper sets out some findings of a research project carried out in private unaided schools in low-income areas of Hyderabad, India. The part of the research project documented here was designed to examine the question: ‘Is the... more
Graphs are widely used to model complicated structures and link them with each other. Some of such structures are XML documents, social networks, and computer networks. Information and model extraction from graph databases is a graph... more
Present paper describes the details of the study of the work that has been done in the field of text searching, a sub-division of Natural Language Processing (NLP) till date. The work in this project includes the study and analysis of... more
We have developed new algorithms for efficient and flexible pattern-matching and pattern-discovery in multidimensional datasets. (A multidimensional dataset is simply any set of points in an N-dimensional space.) These algorithms could be... more
Geometric hashing is a model-based recognition technique based on matching of transformation-invariant object representations stored in a hash table. In the last decade, a number of enhancements have been suggested to the basic method... more
The basic theory of Markov chains has been known to mathematicians and engineers for close to 80 years, but it is only in the past decade that it has been applied explicitly to problems in speech processing. One of the major reasons why... more
Phoneme recognition can mean two things, conscious phoneme-naming and p reconscious phone-categorization. Phoneme naming is based on a (learned) label i n the mental lexicon. Tasks requiring phoneme awareness will therefore exhibit all... more
The aim of the study was to define a simple system for the identification of unknown bodies by using CT images of frontal sinus and to discuss whether it was worth to add measurements to the system or not. The system was including simple... more
In recent years, the increase in cyber threats has raised many concerns about security and privacy in the digital world. However, new attack methods are often limited to a few core techniques. Here, in order to detect new threat patterns,... more
This paper investigates the use of facial gestures for identity recogni- tion. This is the first time that such a quantitative evaluation is conducted, comparing the analyses of 2D versus 3D dynamic data of verbal and non- verbal facial... more
Abstract: Palm vein authentication is one of the most reliable authentication. Which contain physiological body characteristics that can be used to distinguish between users. In this paper we represent in new approach for the personal... more
Herein, it is shown that by exploiting integral definitions of well known special functions, through generalizations and differentiations, broad classes of definite integrals can be solved in closed form or in terms of special functions.... more
Content-based image retrieval consists in retrieving from an image database the most similar image with respect to a query, according to some similarity measure. This scenario has numerous specic applications that include bioinformatics... more
Template Matching is one of the most basic techniques in computer vision, where the algorithm should search for a template image T in an image to analyze I. It is heavily used in signal, image and video processing. A lot of applications... more