Results 21 to 30 of about 63,648 (277)

LFLDNet: Lightweight Fingerprint Liveness Detection Based on ResNet and Transformer

open access: yesSensors, 2023
With the rapid development of fingerprint recognition systems, fingerprint liveness detection is gradually becoming regarded as the main countermeasure to protect the fingerprint identification system from spoofing attacks.
Kang Zhang   +3 more
doaj   +1 more source

FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data

open access: yesIEEE Access, 2020
Currently, searchable encryption has attracted considerable attention in the field of cloud computing. The existing research mainly focuses on keyword-based search schemes, most of which support the exact matching of keywords.
Guoxiu Liu   +4 more
doaj   +1 more source

Near Relation-Based Indoor Positioning Method under Sparse Wi-Fi Fingerprints

open access: yesISPRS International Journal of Geo-Information, 2020
Indoor positioning is of great importance in the era of mobile computing. Currently, considerable focus has been on RSS-based locations because they can provide position information without additional equipment.
Yankun Wang   +9 more
doaj   +1 more source

A-Survey: Identification and Classification of Fingerprints via the Extreme Learning Machine Algorithm

open access: yesInteligencia Artificial, 2023
The fingerprint comes to be the most popular and utilized biometric for identifying persons owing to its bio-invariant characteristic, precision, as well as easy acquisition.
David Zabala-Blanco   +4 more
doaj   +1 more source

Computer Algebra for Fingerprint Matching [PDF]

open access: yes, 2003
We show in this paper how some algebraic methods can be used for fingerprint matching. The described technique is able to compute the score of a match also when the template and test fingerprints have been not correctly acquired. In particular, the match is independent of translations, rotations and scaling transformations of the template.
BISTARELLI, Stefano   +2 more
openaire   +4 more sources

MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME

open access: yesIraqi Journal of Information & Communication Technology, 2022
Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention.
Safana A. Abdulrahman, M. F. Al-Gailani
doaj   +1 more source

Peptide mass fingerprinting using field-programmable gate arrays [PDF]

open access: yes, 2009
The reconfigurable computing paradigm, which exploits the flexibility and versatility of field-programmable gate arrays (FPGAs), has emerged as a powerful solution for speeding up time-critical algorithms.
Beynon, R.J., Bogdan, I.A., Coca, D.
core   +1 more source

Review of security techniques for memristor computing systems

open access: yesFrontiers in Electronic Materials, 2022
Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotics. To enhance the computational efficiency of these algorithms, in comparison to the traditional von Neuman computing ...
Minhui Zou   +3 more
doaj   +1 more source

Universal Compressed Text Indexing [PDF]

open access: yes, 2018
The rise of repetitive datasets has lately generated a lot of interest in compressed self-indexes based on dictionary compression, a rich and heterogeneous family that exploits text repetitions in different ways. For each such compression scheme, several
Navarro, Gonzalo, Prezza, Nicola
core   +2 more sources

Personal Identification based on Multi Biometric Traits [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2017
The biometric system that based on single biometric measure (Unimodal) are usually contained variety of problems and limitation like noisy data, does not provide high security and non-university, so we used the multibiometric system to improve the ...
Wigdan J. Al-Kubaisy, Muzhir S. Al-Ani
doaj   +1 more source

Home - About - Disclaimer - Privacy