Results 41 to 50 of about 319,329 (190)
Entropy based fingerprint for local crystalline order
We introduce a new fingerprint that allows distinguishing between liquid-like and solid-like atomic environments. This fingerprint is based on an approximate expression for the entropy projected on individual atoms.
Parrinello, Michele, Piaggi, Pablo M.
core +1 more source
Fingerprint Analysis with Marked Point Processes [PDF]
We present a framework for fingerprint matching based on marked point process models. An efficient Monte Carlo algorithm is developed to calculate the marginal likelihood ratio for the hypothesis that two observed prints originate from the same finger ...
Forbes, Peter G. M. +2 more
core +2 more sources
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that can fortuitously match with a large number of fingerprints thereby ...
Bontrager, Philip +4 more
core +1 more source
Wireless positioning methods for mitigating the influence of environmental and terminal diversity
Two optimization algorithms respectively were proposed according to the traditional two methods based on ranging and fingerprint-based to mitigate or circumvents the influence of environmental parameters on the position-ing results and compared ...
Jietai WANG +4 more
doaj
Feature Generation-Based Fingerprint Liveness Detection: A Novel Multimodal Approach
Fingerprint liveness detection is an emerging security solution that distinguishes between spoofed fingerprints and genuine fingerprints. Its importance increases because of the availability of cheap spoofing materials for fingerprints.
B. R. Rajakumar, S. Amala Shanthi
doaj +1 more source
Cluster housing is chosen by many people because of the security system is uses one gate system. However, the housing portal system that is often encountered still uses human labor and guest data recording is also still done manually.
Mochammad Taufik +2 more
doaj +1 more source
Global Variational Method for Fingerprint Segmentation by Three-part Decomposition
Verifying an identity claim by fingerprint recognition is a commonplace experience for millions of people in their daily life, e.g. for unlocking a tablet computer or smartphone.
Gottschlich, Carsten, Thai, Duy Hoang
core +1 more source
THE DRIVING LICENSE AUTHORIZED BASED ON IOT
Driving without a valid driver’s license is considered illegal and causes endangers the safety of people, as well as vehicles. Necessary measures should therefore be taken to ensure that vehicles are operated and driven only by those with the appropriate
Ahmed. A. Abdel Hussein +2 more
doaj +1 more source
A Reinforcement Learning Agent for Minutiae Extraction from Fingerprints [PDF]
In this paper we show that reinforcement learning can be used for minutiae detection in fingerprint matching. Minutiae are characteristic features of fingerprints that determine their uniqueness.
Bazen, Asker M. +3 more
core +3 more sources
We examine WebRTC's suitability as a means of Internet censorship circumvention. WebRTC is a framework and suite of protocols for peer-to-peer communication between web browsers. We analyze the implementation differences in instantiations of WebRTC that make it possible to "fingerprint" implementations--potentially distinguishing circumvention-related ...
David Fifield, Mia Gil Epner
openaire +2 more sources

