نتایج جستجو برای: finger print

تعداد نتایج: 54965  

2014
Amandeep Kaur

Amandeep Kaur1, Ameeta2, Babita3 Department of ECE, PCET, Lalru Mandi. PTU Jalandhar, Punjab Asst. Professor, Department of ECE, PCET, Lalru Mandi. PTU Jalandhar, Punjab 3 Asst. Professor,Department of Computer Science and Engineering , PCET, Lalru Mandi PTU Jalandhar, Punjab Email:[email protected] Abstract—A fingerprint is the feature pattern of one finger. It is believed with strong ev...

2013
Ruifang Wang Daniel Ramos Didier Meuwly Raymond Veldhuis Julian Fierrez Rudolf Haraksim

Large non-linear distortion in a finger mark, introduced at the time when a latent print was left in crime scenes, is one main difficulty in forensic fingerprint matching [1] compared to plain or rolled fingerprint matching. It is significant and desirable that AFIS systems in forensic applications have much higher distortion tolerance compared to those systems for civil purposes. Moreover, rec...

Journal: :The International journal of Multimedia & Its Applications 2012

Journal: :International Journal of Ayurvedic Medicine 2021

To study physico-chemical, phytochemical and high performance thin layer chromatography of a Siddha drug “Kadukkai Legiyam” (KL). The prepared Kadukkai Legiyam (KL) was as per the standard operating procedures mentioned in literature. Then subjected to physicochemical parameters, screening, chromatographic photo documentation (TLC), (HPTLC) finger print profile hexane, chloroform, ethanol hydro...

Journal: :IEEE Photonics Journal 2021

To advancement in security applications, for the first time, a bio-chaotic key generated from emerging biometric trait “finger knuckle print (FKP)” has been proposed data and authentication. In system, feasibility to generate multiple keys single FKP image exploited secure information, which results significant enhancement of strength. The encryption decryption processes keep user-specificity p...

2013
D. Pugazhenthi B. Sree Vidya

Cloud computing is one of the emerging technologies, that takes network users to the next level. Cloud is a technology where resources are paid per usage rather than owned. One of the biggest challenges in this technology is Security. Though users use service provider’s resources, there is a great level of reluctance from users’ end because of significant security threats packed with this techn...

2017
DIMITAR GEORGIEV

In this paper is presented an extensive overview of the biometrics that are commonly used in the electronic identity documents or are considered perspective for future use for digital personal identification at large scale. All the presented features are compared based on their advantages and disadvantages concerning the practicality of feature extraction, identification accuracy, accessibility...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید