The Entrance Authentication and Tracking Systems Using Object Extraction and the RFID Tag
暂无分享,去创建一个
[1] Zhan-Wei Song,et al. RFID-Based Security Authentication System Based on a Novel Face-Recognition Structure , 2010, 2010 WASE International Conference on Information Engineering.
[2] Shriram V. Revankar,et al. Constrained contouring in polar coordinates , 1993, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
[3] Alexander H. Waibel,et al. A real-time face tracker , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.
[4] Ming-Ting Sun,et al. A family of vlsi designs for the motion compensation block-matching algorithm , 1989 .
[5] William E. Higgins,et al. Symmetric region growing , 2003, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[6] Yuping Zhao,et al. A Novel Anti-Collision Algorithm with Dynamic Tag Number Estimation for RFID Systems , 2006, 2006 International Conference on Communication Technology.
[7] Kim Young-Il,et al. Security considerations for RFID technology adoption , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[8] Konstantinos N. Plataniotis,et al. Region growing and region merging image segmentation , 1997, Proceedings of 13th International Conference on Digital Signal Processing.
[9] Song Li,et al. Electromagnetic Environment of UHF-RFID , 2008, 2008 10th Electronics Packaging Technology Conference.
[10] P.W.M. Tsang,et al. Integration of video surveillance and RFID for remote scene monitoring , 2008, 2008 Asia-Pacific Microwave Conference.
[11] Wen Hu,et al. Wavelet Based Sub-space Features for Face Recognition , 2008, 2008 Congress on Image and Signal Processing.
[12] Kay Römer,et al. Smart Identification Frameworks for Ubiquitous Computing Applications , 2004, Wirel. Networks.