Made available in DSpace on 2022-04-28T19:40:05Z (GMT). No. of bitstreams: 0 Previous issue date: 2021-08-01; Seeded segmentation methods have gained a lot of attention due to their good performance in fragmenting complex images, easy usability and synergism with graph-based representations. These methods usually rely on sophisticated computational tools whose performance strongly depends on how good the traini...
Visualization assisted crime analysis tools used by public security agencies are usually designed to explore large urban areas, relying on grid-based heatmaps to reveal spatial crime distribution in whole districts, regions, and neighborhoods. Therefore, those tools can hardly identify micro-scale patterns closely related to crime opportunity, whose understanding is fundamental to the planning of preventive act...
Extracting and analyzing crime patterns in big cities is a challenging spatiotemporal problem. The hardness of the problem is linked to two main factors, the sparse nature of the crime activity and its spread in large spatial areas. Sparseness hampers most time series (crime time series) comparison methods from working properly, while the handling of large urban areas tends to render the computational costs of ...
Made available in DSpace on 2022-05-01T09:47:27Z (GMT). No. of bitstreams: 0 Previous issue date: 2021-01-01; Fingerprint-based authentication systems represent what is most common in biometric authentication systems. Today’s simplest tasks, such as unlocking functions on a personal cell phone, may require its owner’s fingerprint. However, along with the advancement of this category of systems, have emerged fra...