Results 71 to 80 of about 319,329 (190)

Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System

open access: yesComputers, 2018
Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud.
Milad Salem   +2 more
doaj   +1 more source

Gyroscope-Based Smartphone Model Identification via WaveNet and EfficientNetV2 Ensemble

open access: yesIEEE Access
Smartphone model detection through sensor data is important for enhancing security protocols, preventing device fraud, and ensuring authorized service access.
Erkan Kiymik, Ali Emre Ozturk
doaj   +1 more source

Development of KASP markers, SNP fingerprinting and population genetic analysis of Cymbidium ensifolium (L.) Sw. germplasm resources in China

open access: yesFrontiers in Plant Science
Cymbidium ensifolium (L.) Sw. is a valuable ornamental plant in the genus Cymbidium, family Orchidaceae, with high economic and ecological significance.
Baoming Shen   +5 more
doaj   +1 more source

Protein-Based Fingerprint Analysis for the Identification of Ranae Oviductus Using RP-HPLC

open access: yesMolecules, 2019
This work demonstrated a method combining reversed-phase high-performance liquid chromatography (RP-HPLC) with chemometrics analysis to identify the authenticity of Ranae Oviductus.
Yuanshuai Gan   +6 more
doaj   +1 more source

Deep Cancelable Multibiometric Finger Vein and Fingerprint Authentication With Non-Negative Matrix Factorization

open access: yesIEEE Access
Biometric authentication technologies, which use physiological and behavioral traits to verify identity, have added a new layer of protection. However, concerns about privacy, security, and illegal entry persist.
Mohamed Hammad   +4 more
doaj   +1 more source

Walking fingerprinting

open access: yesJournal of the Royal Statistical Society Series C: Applied Statistics
Abstract We consider the problem of predicting an individual’s identity from accelerometry data collected during walking. In a previous paper, we transformed the accelerometry time series into an image by constructing the joint distribution of the acceleration and lagged acceleration for a vector of lags.
Lily Koffman   +2 more
openaire   +3 more sources

Mathematical and Chemometrical Models – Tools to Evaluate Heavy Metals Contamination

open access: yesScientific Papers Animal Science and Biotechnologies, 2023
The aim of the this study is to present a combined view of bio – geo - chemistry, soil – plant interactions, mathematic models and statistic analysis, based on the correlation between the levels of soil contamination, and the remanence of polluting ...
Despina-Maria Bordean   +7 more
doaj  

Fingerprinting Ikaros [PDF]

open access: yesNature Immunology, 2013
Fotini, Gounari, Barbara L, Kee
openaire   +2 more sources

No Thumbs Up in Pictures! Experimental Fingerprint Forgery for Inexperienced Impostors

open access: yesIEEE Access
Fingerprint verification is a popular smartphone authentication method used even for sensitive services such as banking. However, fingerprint verification also has some issues, such as spoofing even by inexperienced impostors utilizing a thumbs up ...
Agata Kruzikova   +3 more
doaj   +1 more source

“Rîmaru” – A Family of Serial Killers

open access: yesErdélyi Jogélet
Between 1970 and 1971, Ion Rîmaru, a 25-year-old university student, committed a number of brutal murders, attempted murders, rapes, and attempted rapes in Bucharest.
Hunor Kádár
doaj   +1 more source

Home - About - Disclaimer - Privacy