Comparison of multiple biometric identification with a single biometric identification system
Çalışkan, Abidin +2 more
openaire +1 more source
Rapid Nasal Breathing as a Biometric Trigger: High-Accuracy Electroencephalogram-Based Authentication for Clinical Applications. [PDF]
Chen C +8 more
europepmc +1 more source
Secure facial biometric authentication in smart cities using multimodal methodology. [PDF]
Sureshkumar A +4 more
europepmc +1 more source
Enhancing patient admission efficiency through a hybrid cloud framework for medical record sharing. [PDF]
Abughazalah M +3 more
europepmc +1 more source
Establishing a new methodology for annelid studies: a biometric study of the ragworm <i>Hediste diversicolor</i> (Müller, 1776). [PDF]
Almeida J +3 more
europepmc +1 more source
Biometric Identification in Virtual Worlds using Biometric Fusion Techniques
openaire +1 more source
Related searches:
Biometric Driver Identification
SAE Technical Paper Series, 2008<div class="htmlview paragraph">This paper deals with the use of biometric methods of driver identification in the vehicle. It compares different methods and evaluates their possible uses in the vehicle. The methods of fingerprint, iris recognition and face recognition are dealt with in particular.</div> <div class="htmlview paragraph ...
Ulrich Bueker +2 more
openaire +1 more source
Biometrics identification techniques
Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No.02EX527), 2003Biometrics represents the most secure way to identify individuals because it provides a novel approach to recognize the identity, or verify the claimed identity through a unique, highly reliable and robust physical characteristic or personal trait.
null Zhang Mingui +4 more
openaire +1 more source
BIOMETRICS, IDENTIFICATION AND SURVEILLANCE
Bioethics, 2008ABSTRACTGoverning by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This ‘solution’ to difficulties of verification is described and some technical weaknesses are discussed.
openaire +2 more sources

