Results 91 to 100 of about 330,139 (381)
Biometrics and Privacy-Preservation: How Do They Evolve?
The emerging field of privacy-preserving biometrics is attracting significant attention, as a paradigm that can address several of the key concerns in cryptographic authentication processes, whilst simultaneously addressing the issues of privacy.
Quang Nhat Tran+2 more
doaj +1 more source
Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud
Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological
Ferrett, Terry+3 more
core +1 more source
A multi‐functional photo‐enzymatic nanoreactor HRP@Fe‐NU‐1003 is developed through co‐immobilization of horseradish peroxidase and FeCl2 on a photosensitive metal–organic frameworks NU‐1003. This material showcases remarkable sensitivity and efficacy in both detecting and subsequently photo‐degrading chloramphenicol residues in food products.
Lu Ran+5 more
wiley +1 more source
Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study
We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs), Artificial Neural Networks (ANNs),
I. G. Damousis, S. Argyropoulos
doaj +1 more source
A healthcare toilet system is introduced to passively measure defecation behavior. Real‐time data on stool dropping duration, thickness, and a newly defined “eu‐tenesmus” interval show correlations with stool form and gender differences. Results from 45 defecation events reveal a promising method for comprehensive defecation analysis.
Zhiquan Song+16 more
wiley +1 more source
Background Patient-reported outcomes such as health-related quality of life (HRQoL) are increasingly used as endpoints in randomized cancer clinical trials.
Célia Touraine+5 more
doaj +1 more source
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls.
AA Ahmed+7 more
core +1 more source
Wireless Technologies for Wearable Electronics: A Review
This review discusses recent advancements in wireless wearable electronics, focusing on communication technologies and power solutions. It covers key design considerations, explores wireless protocols from short‐ to long‐range networks, and examines powering methods such as integrated sources and energy harvesting.
Choong Yeon Kim+8 more
wiley +1 more source
Biometric Borders Envisaged by Frontex: Fundamental Rights in the Backseat
(Series Information) European Papers - A Journal on Law and Integration, 2024 9(2), 621-640 | Article | (Table of Contents) I. Introduction. – II. Technological and legal aspects of biometrics. – II.1.
Matija Kontak
doaj +1 more source
Reliable detection of doppelgängers based on deep face representations
Doppelgängers (or lookalikes) usually yield an increased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non‐mated comparison trials.
Christian Rathgeb+3 more
doaj +1 more source