Results 31 to 40 of about 63,648 (277)

Fingerprint liveness detection through fusion of pores perspiration and texture features

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Spoofing attacks on the fingerprint scanners become major and serious concern with the growing development and use of biometric technologies. Level 1 and Level 2 features; which are said to be unique and most commonly used features in fingerprint ...
Diwakar Agarwal, Atul Bansal
doaj   +1 more source

Feedback of Non-Local dxy Nematicity on the Magnetic Anisotropy in FeSe

open access: yesFrontiers in Physics, 2022
We analyze theoretically the magnetic anisotropy in the nematic phase of FeSe by computing the spin and the orbital susceptibilities from the microscopic multiorbital model. In particular, we take into account both the xz/yz and the recently proposed non-
Steffen Bötzel, Ilya M. Eremin
doaj   +1 more source

Parallel and Distributed Computation of a Fingerprint Access Control System

open access: yesJournal of Computing Research and Innovation, 2022
This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops
Bopatriciat Boluma Mangata   +4 more
doaj   +3 more sources

Fingerprint verification using computational geometry

open access: yesDYNA, 2016
"This paper presents a robust minutiae based method for fingerprint verification. The proposed method uses Delaunay Triangulation to represent minutiae as nodes of a connected graph composed of triangles. The minimum angle over all triangulations is maximized, which gives local stability to the constructed structures against rotation and translation ...
Manuel Ramírez-Flores   +2 more
openaire   +6 more sources

LDFS: A Low Latency In-Line Data Deduplication File System

open access: yesIEEE Access, 2018
Due to the rapid proliferation of sensors and intelligent devices, the cyber-physical-social computing and networking (CPSCN) is emerging as a new computing paradigm. Massive data have been generated in the CPSCN environment.
Yongtao Zhou   +4 more
doaj   +1 more source

Fingerprint Classification through Standard and Weighted Extreme Learning Machines

open access: yesApplied Sciences, 2020
Fingerprint classification is a stage of biometric identification systems that aims to group fingerprints and reduce search times and computational complexity in the databases of fingerprints.
David Zabala-Blanco   +4 more
doaj   +1 more source

Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]

open access: yes, 2014
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core   +1 more source

Reducing computational complexity in fingerprint matching

open access: yesTURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES, 2020
The performance of cross-correlation functions can decrease computational complexity under optimal fingerprint feature selection. In this paper, a technique is proposed to perform alignment of fingerprints followed by their matching in fewer computations.
Mubeen SABIR   +3 more
openaire   +1 more source

Optimal Target Tracking Based on Dynamic Fingerprint in Indoor Wireless Network

open access: yesIEEE Access, 2018
Indoor target tracking is a crucial application of indoor localization systems. Wi-Fi fingerprint-based target tracking/positioning has been extensively studied due to its deployability under pervasive indoor wireless local area networks.
Chun Wang, Juan Luo, Yanliu Zheng
doaj   +1 more source

Immune fingerprinting through repertoire similarity.

open access: yesPLoS Genetics, 2021
Immune repertoires provide a unique fingerprint reflecting the immune history of individuals, with potential applications in precision medicine. However, the question of how personal that information is and how it can be used to identify individuals has ...
Thomas Dupic   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy