1 |
Yang Zhenghui, Li Duo, "The Design and Implementation of a Fingerprint Lock Based on AS602," Chinese Journal of Electron Devices, 39(02), 495-500, 2016.
DOI
|
2 |
Deng, L.Y., Dong Liang Lee, Yi-Jen Liu, "Face Recognition Lock," in Proc. of 2013 International Conference on IT Convergence and Security (ICITCS), 2013.
|
3 |
Rodolf Haraksim, Javier Gallbally, Laurent Beslay, "Fingerprint Growth Model for Mitigating the Ageing Effect on Children's Fingerprints Matching," Pattern Recognition, 88, 614-628, 2019.
DOI
|
4 |
Javad Khodadoust, Ali Mohammad Khodadoust, Xiong Li, Saru Kumari, "Design and Implementation of a Multibiometric System Based on Hand's Traits," Expert System with Applications, 97, 303-314, 2018.
DOI
|
5 |
Li Zhengxin, Zhang Fengming, Li Kewu, Zhang Xiaofeng, "Index Structure for Multivariate Time Series under DTW Distance Metric," Journal of Software, 25(03), 560-575, 2014.
|
6 |
Cheng Xueqi, Jin Xiaolong, Wang Yuanzhuo, Guo Jiafeng, Zhang Tieying, Li Guojie, "Survey on Big Data System and Analytic Technology," Journal of Software, 25(09), 1889-1908, 2014.
|
7 |
Li Nianfeng, "Research of The Gesture Authentication Method Based on Android and Its Realization," Beijing:School of Electronic Information Engineering, Communication University of China, 37-38, 2018.
|
8 |
Zhang Jinxue, Zhang Ming, Li Yuanyuan, "Quaternion - Based Attitude Control of Fixed-wing Micro Air Vehicle," Computer Measurement & Control, 20(07), 1851-1854, 2012.
|
9 |
Luo Tianhong, Ma Li, "Path Planning for Spider Biomimetic Robot Leg based on Cubic Polynomial Interpolation Function with Midpoints," Mechanical Drive, 41(07), 1-6, 2017.
|
10 |
Chen Yue, Ding Lingwei, Wu Hongxuan, Liu Guohai, Liu Hui, "Power Quality Signal Reconstruction of Backtracking-Based Self-Adaptive Matching Pursuit Method," Journal of Electronic Measurement and Instrumentation, 31(05), 731-738, 2017.
|
11 |
Li Jing, Song Jing, Long Pengcheng, Liu Hongfei, Jiang Ping, "Parallel Computing Method of Monte Carlo Criticality Calculation Based on Bi-directional Traversal," Nuclear Techniques, 38(06), 95-98, 2015.
|
12 |
Liu Shushu, Liu An, Liu Guanfeng, Li Zhixu, Zhao Lei, Zheng Kai, "A Privacy Preserving Framework for Efficient Computation of Trajectory Similarity," Journal of East China Normal University(Natural Science), 2015(05), 154-161+171, 2015.
|
13 |
Zhao Lei, Zhou Yimin, "A Gesture Recognition Based on Improved DTW-IMP Algorithm," Software Guide, 16(11), 12-15+21, 2017.
|
14 |
Lu Gang, Nie Xuyun, Qin Zhiguang, Hou Chuanyong, "Cryptanalysis of a Multivariate Public Key Cryptosystem," Journal of University of Electronic Science and Technology of China, 47(02), 242-246, 2018.
|
15 |
Li Qingwu, Ma Yunpeng, Zhou Yan, Zhou Liangji, "Method of Writer Identification Based on Curvature of Strokes," Journal of Chinese Information Processing, 30(05), 209-214, 2016.
DOI
|
16 |
Huang Yiming, Lei Hang, Zhou Rui, Sang Nan, "Activity and Holding Mode Recognition Using Multiple Sensors," Journal of University of Electronic Science and Technology of China, 46(02), 399-406, 2017.
|
17 |
Yan Lindong, "Combined with the "Eight Principles of Yong" Analysis the Rationality of the Regular Script Writing Action," China Academy of Art, 2017.
|
18 |
Xianjing MENG, Xiaoming XI, Gongping YANG, Yilong YIN, "Finger vein recognition based on deformation information," Science China(Information Sciences, 61(05), 156-170, 2018.
|