Biometrical methods

Xem 1-11 trên 11 kết quả Biometrical methods
  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data

    pdf16p dauphong17 21-02-2012 35 3   Download

  • Nitrogen (N) plays a critical role in crop production. Nowadays, it is possible to detect quantitative trait loci (QTL), as well as their effects and positions on chromosomes, by new molecular and biometrical methods.

    pdf6p masterbarista 14-01-2019 4 0   Download

  • Instead of embedding secret data anywhere in image, it will be embedded in only skin tone region. This skin region provides excellent secure location for data hiding. So, firstly skin detection is performed in cover images and then Secret data embedding will be performed in DWT domain as DWT gives better performance than DCT while compression. This biometric method of Steganography enhances robustness than existing methods.

    pdf4p girlsseek 27-02-2019 9 0   Download

  • Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from physiological, behavioural and other points of view (medical biometrics).

    pdf278p lulanphuong 22-03-2012 214 45   Download

  • The methods for human identity authentication based on biometrics – the physiological and behavioural characteristics of a person have been evolving continuously and seen significant improvement in performance and robustness over the last few years. However, most of the systems reported perform well in controlled operating scenarios, and their performance deteriorates significantly under real world operating conditions, and far from satisfactory in terms of robustness and accuracy, vulnerability to fraud and forgery, and use of acceptable and appropriate authentication protocols. ...

    pdf0p bi_bi1 13-07-2012 57 10   Download

  • Biometric recognition is one of the most widely studied problems in computer science. The use of biometrics techniques, such as face, fingerprints, iris and ears is a solution for obtaining a secure personal identification. However, the “old” biometrics identification techniques are out of date. This goal of this book is to provide the reader with the most up to date research performed in biometric recognition and descript some novel methods of biometrics, emphasis on the state of the art skills....

    pdf326p bi_bi1 13-07-2012 52 8   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Editorial Advanced Signal Processing and Pattern Recognition Methods for Biometrics

    pdf3p sting09 21-02-2012 36 3   Download

  • Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 529879, 16 pages doi:10.1155/2008/529879 Research Article Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling Francis Minhthang Bui and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, 10 King’s College Road, Toronto, Ontario, Canada M5S 3G4 Correspondence should be addressed to Dimitrios Hatzinakos, dimitris@comm.utoronto.

    pdf16p dauphong18 24-02-2012 34 3   Download

  • The aim of this study was to use a support vector machine (SVM) for the first time as a predictive method for differentiating species of Salix wood through the biometric analysis of their anatomy using wood taken from basal disks of 3 species.

    pdf8p vimb123 11-01-2019 6 0   Download

  • The idea of this book on Sensor fusion and its Applications comes as a response to the immense interest and strong activities in the field of sensor fusion. Sensor fusion represents a topic of interest from both theoretical and practical perspectives. The technology of sensor fusion combines pieces of information coming from different sources/sensors, resulting in an enhanced overall system performance with respect to separate sensors/sources.

    pdf0p 123859674 04-07-2012 42 5   Download

  • Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.

    pdf7p levuphongqn 18-08-2015 40 2   Download



p_strKeyword=Biometrical methods

nocache searchPhinxDoc


Đồng bộ tài khoản