نتایج جستجو برای: finger prints
تعداد نتایج: 35162 فیلتر نتایج به سال:
This study applies methods from causal discovery theory to the output data of climate models. Causal discovery seeks to identify potential cause-effect relationships from data and is used here to learn so-called causal signatures from the data that indicate interactions between the different atmospheric variables. We hope that these causal signatures can act like finger prints for the underlyin...
Biometrics based user authentication involves collecting user’s patterns and then using them to determine if a new pattern is similar enough. The quality of the user’s patterns is as important as the quality of the classifier. But, the issue has been ignored in the literature since the popular biometrics are mostly trait based such as finger prints and iris so that its pattern quality depends o...
Fingerprint Based Gender Classification Using Discrete Wavelet Transform & Artificial Neural Network
This research implements a novel method of gender classification using fingerprints. Two methods are combined for gender classifications. The first method is the wavelet transformation employed to extract fingerprint characteristics by doing decomposition up to 5 levels. The second method is the back propagation artificial neural network algorithm used for the process of gender identification. ...
This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. It is a very interesting topic, as, nowadays, cryptographic protocols can store/produce thousands of bits of secure information, while the user needs a password to make the exchange secure. The major weakness in a cryptographic protocols is the user himself. Biome...
-In this upcoming highly engaged traffic calls in the Peer to Peer (P2P) botnets the high scalability of detection systems is going down. Where the botmasters adopt modern system to detect traffic which ends in the malicious activities and poor scalability. So in this paper, we proposed a highly scalable botnet detection system for a stealthy peer to peer botnets. In this p2p detection it will ...
Luminescence is specially a useful property for the search of invisible evidences at the scene of a crime. In the latent fingerprints particular case, there are at one's disposal fluorescent reagents for their localization. The study of latent lip prints (that is lip prints from protective lipstick, or permanent or long-lasting lipstick that do not leave any visible marks) is more recent than f...
Experience shows that within the sensitive area of documentation in a clinical centre, there are problems involved in acquiring the end user's acceptance of authentication solutions based on smart cards, passwords, finger prints or digital signatures. The individual signature is still the most accepted method of certifying medical documents in hospitals and other health care sectors. This paper...
Signatures continue to be an important biometric because they remain widely used as a means of personal verification and therefore an automatic verification system is needed. Manual signature-based authentication of a large number of documents is a difficult and time consuming task. Consequently for many years, in the field of protected communication and financial applications, we have observed...
Introduction: Sir William Hershel – 1856, may be the first to use fingerprints. An English Chief Magistrate in India who used prints on native contracts Dr. Henry Foulds, notices finger marks on prehistoric pottery. Published an article in “Nature” saying fingerprints could be used for identification. Sir Francis Galton, a British anthropologist and a cousin of Charles Darwin, began his observa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید