Author:
Amirthalingam Gandhimathi,Radhamani G.
Reference27 articles.
1. Analysis of particle swarm optimization algorithm;Bai;J. Comput. Inf. Sci.,2010
2. Biometric authentication: a review;Bhattacharyya;Int. J. u e-Serv., Sci. Technol.,2009
3. Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications;Bui;IEEE Trans. Inf. Forensics Security,2010
4. Chang, Ee-Chien, Shen, Ren, Teo, Francis Weijian, 2006. Finding the original point set hidden among chaff. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 182–188.
5. Lagged variables selection for fuzzy time series models by using binary particle swarm optimization;Egrioglu;AJSCA,2014
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献