نتایج جستجو برای: epididymal biometrics

تعداد نتایج: 11942  

Journal: :CoRR 2017
Scott Streit Brian Streit Stephen Suffian

Biometrics have a long-held hope of replacing passwords by establishing a non-repudiated identity and providing authentication with convenience. Convenience drives consumers toward biometrics-based access management solutions. Unlike passwords, biometrics cannot be script-injected; however, biometric data is considered highly sensitive due to its personal nature and unique association with user...

2016
A. T. Gaikwad

This article is an overview of a current multimodal biometrics research based on fingerprint and palm-print. It explains the pervious study for each modal separately and its fusion technique with another biometric modal. The basic biometric system consists of four stages: firstly, the sensor which is used for enrolment & recognition the biometrics data. Secondly, the pre-processing stage which ...

2011
Mini Singh Ahuja Sumit Chabbra

Biometric technologies are used to analyse human characteristics for security purposes. The most common physical biometrics patterns analyzed for security purposes are the fingerprint, hand, eye, face and voice. The advantages of using biometrics to verify a person’s identity over using passwords or token have been broadly presented in many research papers. However recent research has revealed ...

2004
Michal Choras

Biometrics identification methods proved to be very efficient, more natural and easy for users than traditional methods of human identification. In fact, only biometrics methods truly identify humans, not keys and cards they posses or passwords they should remember. The future of biometrics leads to passive physiological methods based on images of such parts of human body as face and ear. The a...

2016
Ioannis Patoulias Christos Kaselas Dimitrios Patoulias Constantine Theocharides Maria Kalogirou Konstantinos Farmakis Thomas Feidantsis

Adenomatoid tumor is an uncommon benign mesothelial neoplasm, usually localized in the epididymis. It is the most common paratesticular tumor of middle-aged patients (average age of clinical presentation: 36 years). However, these tumors in pediatric and pubertal patients are extremely rare. Due to their rarity, we present a case of adenomatoid tumor of the tail of the epididymis in a 16-year-o...

Journal: :Archivos espanoles de urologia 2009
Mario Alvarez Maestro Raquel Tur Gonzalez Jose Maria Alonso Dorrego Jesus Jesus De la Peña Barthel Manuel Nistal Martin De Serrano

BACKGROUND To report the cases of adenomatoid tumors seen at Hospital Universitario La Paz in the last 15 years. METHODS A clinical, pathological, and surgical study was conducted of males with testicular or paratesticular tumors with a histological report of adenomatoid tumor. RESULTS Among the nine cases studied, seven had paratesticular and two intratesticular adenomatoid tumors. Treatme...

Journal: :IJNCR 2014
Roman V. Yampolskiy Nawaf Ali Darryl D'Souza Abdallah A. Mohamed

This work categorizes and reviews behavioral biometrics with the inclusion of future-oriented techniques. A general introduction to this field is given alongside the benefits of this non-intrusive approach. It presents the examination and analysis of the current research in the field and the different types of behavior-centric features. Accuracy rates for verifying users with different behavior...

2001
Nalini K. Ratha Jonathan H. Connell Ruud M. Bolle

In recent years there has been exponential growth in the use of biometrics for user authentication applications because biometrics-based authentication offers several advantages over knowledge and possession-based methods such as password/PIN-based systems. However, it is important that biometrics-based authentication systems be designed to withstand different sources of attacks on the system w...

2000
Gaël Hachez François Koeune Jean-Jacques Quisquater

Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatically prevent each and every type of attack. Biometrics are not secure unless they are embedded in a strong cryptographic protocol, whose design pays special attention to their specificities. In particular, smart card rev...

2008
Imran Naseem Ajmal S. Mian

In this paper, physiological biometrics from face are combined with behavioral biometrics from speech in video to achieve robust user authentication. The choice of biometrics is motivated by user convenience and robustness to forgery as it is hard to simultaneously forge these two biometrics. We used the Mel Frequency Cepstral Coefficients for text-independent speaker recognition and local scal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید