2013
DOI: 10.2478/jaiscr-2014-0010
|View full text |Cite
|
Sign up to set email alerts
|

Segmentation and Edge Detection Based on Modified ant Colony Optimization for Iris Image Processing

Abstract: Ant colony optimization (stocktickerACO) is a meta-heuristic algorithm inspired by food searching behavior of real ants. Recently stocktickerACO has been widely used in digital image processing. When artificial ants move in a discrete habitat like an image, they deposit pheromone in their prior position. Simultaneously, vaporizing of pheromone in each iteration step avoids from falling in the local minima trap. Iris recognition because of its great dependability and non-invasion has various applications. simul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…It provides a set of tools to extract data from various devices or sources, even at datacenters. MS SQL query language, T-SQL (Transact-SQL), allows for both structural or procedural queries [6][10] [13][31][37] [38]. The DBMS (Database Management System) is based on a client-server architecture.…”
Section: Sql Severmentioning
confidence: 99%
“…It provides a set of tools to extract data from various devices or sources, even at datacenters. MS SQL query language, T-SQL (Transact-SQL), allows for both structural or procedural queries [6][10] [13][31][37] [38]. The DBMS (Database Management System) is based on a client-server architecture.…”
Section: Sql Severmentioning
confidence: 99%
“…In the last years, biometric systems became quite common in our activities due to their high security and availability of affordable sensors [1,2]. However, criminals are already violating them by presenting forged traits, such as gelatin fingers, to fool their capture sensors, a process known as spoofing attack [3].…”
Section: Introductionmentioning
confidence: 99%
“…those applied in medical image processing [19], [4], [9], [6], and any algorithms for edge detection (see e.g. [5]). We do not focus our attention on details like e.g.…”
Section: Color Digital Picture Recognitionmentioning
confidence: 99%
“…In Section 2, information granules are depicted in application to image recognition, and also the OIG is introduced. Those particular information granules are described in Sections 4,5,6, and 7. In Section 3, the GPRS is portrayed.…”
Section: Introductionmentioning
confidence: 99%