نتایج جستجو برای: epididymal biometrics

تعداد نتایج: 11942  

2013
Lauren Long

Traditionally the use of codes or passwords have been used to authenticate access to mobile devices, but now the use of biometrics is increasingly being implemented. However is the use of biometrics a secure way to authenticate access to mobile devices. This paper provides insight into the different areas of biometrics, how they are now implemented on mobile devices as well as their advantages ...

Journal: :Theriogenology 2014
Violeta Muñoz-Fuentes Catharina Linde Forsberg Carles Vilà Jane M Morrell

Sperm samples may be used for assisted reproductive technologies (e.g., farmed or endangered species) or as a source of haploid DNA or sperm-specific RNA. When ejaculated spermatozoa are not available or are very difficult to obtain, as is the case for most wild endangered species, the epididymides of dead animals (e.g., animals that have been found dead, shot by hunters or poachers, or that th...

Journal: :Reproduction, nutrition, developpement 1988
J R Mboungou H R Junera J P Dadoune M A Fain-Maurel

The proteins of epididymal tissues and fluids recovered from different regions of the mouse epididymis from a natural population and an inbred line were examined by polyacrylamide gel electrophoresis under denaturing conditions. Two epididymal specific peptides on the order of 88 and 20 Kilodaltons (Kd), undetected in serum and testicular extracts, were identified in the initial segment, caput,...

2014
Mohamed Sayed

Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometr...

2004
Ping Yan Kevin W. Bowyer Kyong Chang

We present results of the largest experimental investigation of 3D ear biometrics to date. ICP-based approaches were carefully explored, and the best rank one recognition rate achieves 98.8%. Only 4 cases out of 302 are incorrectly matched, and all due to poor data quality. This result is encouraging in that it suggests the uniqueness of the human ear and its potential applicability as a biomet...

Introduction: Thyroid hormones are involved in the regulation of hydrogen sulfide (H2S) biosynthesis. The aim of this study is to determine effects of thyrotoxicosis on H2S levels and mRNA expression of cystathionine-β-synthase (CBS), cystathionine-γ-lyase (CSE) and 3-mercaptopyruvate sulfurtransferase (3-MST) in the adipose tissue of rat. Materials and Methods: Male rats were divided into the ...

2010
HATIM A. ABOALSAMH

Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the follo...

2010
HATIM A. ABOALSAMH

Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the follo...

2013
V. K. Narendira Kumar B. Srinivasan

Biometrics identification methods have proved to be very efficient, more natural and easy for users than traditional methods of human identification. Biometrics methods truly identify humans, not keys and cards they posses or passwords they should remember. Ear on the other hand, has a more uniform distribution of color, so almost all information is conserved when converting the original image ...

Journal: :Pattern Recognition 2002
Ruud M. Bolle Jonathan H. Connell Nalini K. Ratha

Biometrics authentication o,ers many advantages over conventional authentication systems that rely on possessions or special knowledge. With conventional technology, often the mere possession of an employee ID card is proof of ID, while a password potentially can be used by large groups of colleagues for long times without change. The fact that biometrics authentication is non-repudiable (hard ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید