نتایج جستجو برای: finger prints

تعداد نتایج: 35162  

2003
Silvestro Micera Ettore Cavallaro Rossella Belli Franco Zaccone Eugenio Guglielmelli Paolo Dario Diego Collarini Bruno Martinelli Chiara Santin Renzo Marcovich

The aim of this paper was to analyse the feasibility of using a sensorised glove as a tool for the assessment of hand function in persons with orthopedic disorders such as rhizoarthrosis. A glove embedding 20 Halleffect sensors was used for this purpose. Its performance in terms of repeatability were preliminary investigated in order to define an effective strategy for the use of the glove in t...

2001
Phillip W. Lord Jacqueline Renée Reich Alex L. Mitchell Robert Stevens Terri K. Attwood Carole A. Goble

There have been several attempts at addressing the problem of annotating sequence data computationally. Annotation generation can be considered a pipeline of processes: first harvesting data from a variety of data sources, then distilling and transforming it into a form more appropriate for the end database. This task is usually performed by human annotators, a solution that is clearly not scal...

Journal: :Nepal Medical College journal : NMCJ 2011
A Bhakta S Mistri G C Mondal M Bandyopadhyay T Bhattacharaya S K Ghosh

Characteristic epidermal ridges formed on the finger pad and on the palm by the end of the second trimester and remain unchanged thereafter and those are responsible for the highly specific finger prints of each individual. These ridges are nither influenced by later prenatal period nor they subject to any influence in the postnatal environmental factors because the formation of ridge patterns ...

Journal: :IJESDF 2013
G. Mary Amirtha Sagayee S. Arumugam G. S. Anandha Mala

The greatest strength of biometrics is that it does not change over time. But at the same time while using it directly for enhancing the security in network system, if that data has been compromised, its compromised forever[1]. Therefore, cancellable biometrics will increase the privacy which means that the true biometrics are never stored or revealed to the authentication server. Biometrics, c...

2015
R. Parimala C. Jayakumar

As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and au...

2005
Harish Srinivasan Sargur N. Srihari Matthew J. Beal

The fingerprint verification task answers the question of whether or not two fingerprints belongs to the same finger. The paper focuses on the classification aspect of fingerprint verification. Classification is the third and final step after after the two earlier steps of feature extraction, where a known set of features (minutiae points) have been extracted from each fingerprint, and scoring,...

Journal: :Teorìâ ta praktika sudovoï ekspertizi ì krimìnalìstiki 2022

Сharacteristic features of technological research on palm and finger prints are de- fined described in detail. Considerable attention has been paid to methodical approach development that enables forensic be carried out without harming integrity the paper medium which in- visible left. The opinion use Projectina Docustat DS-210 Regula 4305 devices (in case applying principle gradual combination...

Journal: :CoRR 2016
Mohammed Eltayeb Tareq Y. Al-Naffouri Robert W. Heath

The radiation pattern of an antenna array depends on the excitation weights and the geometry of the array. Due to wind and atmospheric conditions, outdoor millimeter wave antenna elements are subject to full or partial blockages from a plethora of particles like dirt, salt, ice, and water droplets. Handheld devices are also subject to blockages from random finger placement and/or finger prints....

2016
C. Huynh P. de Chazal D. McErlean R. Reilly J. Flynn R. B. Reilly

In this paper, a novel approach is made to discard the degradations in full shoe prints and partial shoe prints, in processing those images for recognition. A pass band DCT coefficient has been used to extract feature vectors. A more robust approach has been dealt with to find the matching between the partial shoe prints and the images in the data base. This method makes

2009
B. Karmakar I. Malkin

Background: Dermatoglyphics is widely used as a genetically determined trait in Anthropology. However, little is known about their pattern of inheritance due to lack of advanced statistical genetic model-fitting techniques despite the existence of advanced statistical packages. Objectives: The aim of the present study is to determine the mode of inheritance of dermatoglyphic traits through comp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید