Results 261 to 270 of about 61,769 (284)
Some of the next articles are maybe not open access.
International Journal of Information Retrieval Research, 2011
In the age of information the rise in development of (ICT) Information Communication Technology and Internet, the format of documents has changed to digital. Electronic information sources have become an important part for today’s library and users. Electronic information is gaining more importance in academic activities with an extreme change in the ...
Prakash Dongardive, Neela Deshpande
openaire +2 more sources
In the age of information the rise in development of (ICT) Information Communication Technology and Internet, the format of documents has changed to digital. Electronic information sources have become an important part for today’s library and users. Electronic information is gaining more importance in academic activities with an extreme change in the ...
Prakash Dongardive, Neela Deshpande
openaire +2 more sources
Biometric Technologies in Healthcare Biometrics
2019The aim of this chapter is to introduce biometrics systems and discuss the essential components of biometrics technologies in the healthcare system. The discussion also includes the state-of-the-art biometrics technologies, selection criteria of a suitable biometrics system, biometrics identity management, and multi-biometrics fusion for healthcare ...
Rinku Datta Rakshit +1 more
openaire +1 more source
2009
The modern information age gives rise to various challenges, such as organization of society and its security. In the context of organization of society, security has become an important challenge. Because of the increased importance of security and organization, identification and authentication methods have developed into a key technology in various ...
Richa Singh +2 more
openaire +1 more source
The modern information age gives rise to various challenges, such as organization of society and its security. In the context of organization of society, security has become an important challenge. Because of the increased importance of security and organization, identification and authentication methods have developed into a key technology in various ...
Richa Singh +2 more
openaire +1 more source
2015
Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues.
Ajay Rawat, Shivani Gambhir
openaire +1 more source
Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues.
Ajay Rawat, Shivani Gambhir
openaire +1 more source
ACM SIGCAS Computers and Society, 2010
Odor detection and identification by machines is currently being done to evaluate perfumes, wine, olive, oil, and even find people buried in rubble. Extending body odor detection to authentication may seem far-fetched and unrealistic. Yet such an application is plausible, given that like a fingerprint or iris, the human body odor is unique.
openaire +2 more sources
Odor detection and identification by machines is currently being done to evaluate perfumes, wine, olive, oil, and even find people buried in rubble. Extending body odor detection to authentication may seem far-fetched and unrealistic. Yet such an application is plausible, given that like a fingerprint or iris, the human body odor is unique.
openaire +2 more sources

