نتایج جستجو برای: finger print

تعداد نتایج: 54965  

2014
Esther I de Bruin John H Graham Anneke Louwerse Anja C Huizink

Dermatoglyphics, ridge constellations on the hands and feet, are permanently formed by the second trimester of pregnancy. Consequently, they are considered "fossilized" evidence of a specific prenatal period. A high frequency of dermatoglyphic anomalies, or a high rate of dermatoglyphic asymmetry (discordance), is an indication of developmental instability (prenatal disturbances) prior to 24-we...

Journal: :Journal of Pharmaceutical Negative Results 2022

Aim: To compare the differences in finger tips patterns and a-b ridge count patients with type II diabetes mellitus as case non-diabetic control group.Materials methods: The study is conducted 100 diabetic persons a group. For collection of palmar prints ‘Cumins midlo’ method has been used. Non were carefully selected to be free from any disease which can influence dermatoglyphic pattern.Observ...

Journal: :CoRR 2017
Shahram Najam Syed Aamir Zeb Shaikh Shabbar Naqvi

A novel hybrid design based electronic voting system is proposed, implemented and analyzed. The proposed system uses two voter verification techniques to give better results in comparison to single identification based systems. Finger print and facial recognition based methods are used for voter identification. Cross verification of a voter during an election process provides better accuracy th...

Journal: :IJACI 2014
Heba Aly Moustafa Youssef

WiFi-based localization became one of the main indoor localization techniques due to the ubiquity of WiFi connectivity. However, indoor environments exhibit complex wireless propagation characteristics. Typically, these characteristics are captured by constructing a fingerprint map for the different locations in the area of interest. This finger print requires significant overhead in manual con...

2015
R. Parimala C. Jayakumar

As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and au...

2014
Leena Seasotiya Priyanka Siwach Anupma Malik Sheema Bai Pooja Bharti Sunita Dalal

The present study was aimed to develop the high performance thin layer chromatography (HPTLC) finger print profile of methanol and ethyl acetate extracts of leaves of Cassia fistula. Chromatographic technique was used for separation of components from different extracts of leaves. This study was planned to develop a HPTLC fingerprint profile of extracts in different solvents such as petroleum e...

2015
Vandana Yadav Vinayak Ashok Bharadi

The finger knuckle print (FKP) of a particular person is found to be unique and can serve as a biometric feature has been revealed recently by the researchers. In this paper finger knuckle print will be used as a biometric feature. The databaseImages from Hong KongPolytechnic Universitywere processed using Kekre’s hybrid wavelet type 1 and type 2 for the generation of results. Kekre’s hybrid wa...

2012
Premanand M. Natarajan

Authenticity of the user is the major issue in today’s internet applications such as online transaction. Password has been the most used authentication mechanism which is subjected to online attacks. Due to unavoidable hacking on the internet, it is difficult to trust the User Identity on the internet. To solve this problem this paper proposes a BIOMETRIC based Visual Cryptography scheme to add...

2013
L. H. Adamu M. G. Taura W. O. Hamman S. A. Ojo A. U. Dahiru A. A Sadeeq K. B. Umar

Establishment of association between two variables in the forensic science is of paramount importance. The study was aimed to determine association of lip prints types and left thumb prints among Nigerians. A total of 820 subjects (414 male and 406 female) participated in the study. The lip prints were obtained on microscopic glass slide and developed using carbon black powder. For finger print...

2014
Mrs. R. Sridevi S. Karthika

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید