Results 31 to 40 of about 186,232 (264)

Genetic Programming for Multibiometrics

open access: yes, 2012
Biometric systems suffer from some drawbacks: a biometric system can provide in general good performances except with some individuals as its performance depends highly on the quality of the capture. One solution to solve some of these problems is to use
Giot, Romain, Rosenberger, Christophe
core   +3 more sources

Biometrics

open access: yes, 2023
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication.
Sophia Ding   +3 more
  +4 more sources

Photoplethysmogram Biometric Authentication Using a 1D Siamese Network

open access: yesSensors, 2023
In the head-mounted display environment for experiencing metaverse or virtual reality, conventional input devices cannot be used, so a new type of nonintrusive and continuous biometric authentication technology is required.
Chae Lin Seok   +3 more
doaj   +1 more source

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

Broadband, Flexible, Skin‐Compatible Carbon Dots/Graphene Photodetectors for Wearable Applications

open access: yesAdvanced Functional Materials, EarlyView.
Broadband, flexible photodetectors integrating nitrogen‐rich carbon dots with single‐layer graphene on plastic substrates are demonstrated. A biocompatible chitosan–glycerol electrolyte enables efficient low‐voltage gating and on‐skin operation. The devices exhibit ultraviolet‐to‐near‐infrared response, mechanical robustness under bending, and verified
Nouha Loudhaief   +20 more
wiley   +1 more source

Noninvasive tests for nonalcoholic fatty liver disease in a multi‐ethnic population: The HELIUS study

open access: yesHepatology Communications, EarlyView., 2022
Abstract Nonalcoholic fatty liver disease (NAFLD) is increasing in prevalence and severity globally, prompting noninvasive testing, yet limited data exist on noninvasive liver tests (NITs) including transient elastography (TE) in ethnically diverse populations.
Anne‐Marieke van Dijk   +6 more
wiley   +1 more source

Keystroke Biometrics Ongoing Competition

open access: yesIEEE Access, 2016
This paper presents the first Keystroke Biometrics Ongoing Competition (KBOC) organized to establish a reproducible baseline in person authentication using keystroke biometrics.
Aythami Morales   +7 more
doaj   +1 more source

Designing Asymmetric Memristive Behavior in Proton Mixed Conductors for Neuromorphic Applications

open access: yesAdvanced Functional Materials, EarlyView.
Protonic devices that couple ionic and electronic transport are demonstrated as bioinspired neuromorphic elements. The devices exhibit rubber‐like asymmetric memristive behavior with slow voltage‐driven conductance increase and rapid relaxation, enabling simplified read–write operation.
Nada H. A. Besisa   +6 more
wiley   +1 more source

The Maintenance of Accuracy and Reliability of Electronic Evidence through Biometric and Encryption [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī, 2015
The reliability of electronic evidence means the authenticity of electronic data in court and playing a role in the judgments. In order to have the same demonstrative function as traditional evidence, electronic evidence must meet two main requirements ...
Hasanali Moazenzadegan   +2 more
doaj   +1 more source

UBSegNet: Unified Biometric Region of Interest Segmentation Network

open access: yes, 2017
Digital human identity management, can now be seen as a social necessity, as it is essentially required in almost every public sector such as, financial inclusions, security, banking, social networking e.t.c.
Jha, Ranjeet Ranjan   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy