Results 31 to 40 of about 3,540 (167)

Evaluating biometrics fingerprint template protection for an emergency situation

open access: yesTehnički Glasnik, 2019
Biometric template protection approaches have been developed to secure the biometric templates against image reconstruction on the stored templates. Two cancellable fingerprint template protection approaches namely minutiae-based bit-string cancellable ...
Ei Ei Mon   +3 more
doaj   +1 more source

Analysis of fingerprint minutiae to form fingerprint identifier

open access: yesJOIV: International Journal on Informatics Visualization, 2020
Detailed human fingerprints, almost unique, are difficult to change and are permanent on an individual's life, making them suitable as long-term signs of human identity.
Ziad Alqadi   +3 more
doaj   +1 more source

“Time‐Tripping” and Memory‐Making: A Grounded Theory of Grounded Theory

open access: yesSymbolic Interaction, EarlyView.
This paper explores the development of grounded theory methodology through the lens of memory studies, introducing the concept of “time‐tripping” as a key generic social process. The paper identifies several sub‐processes of time‐tripping, including “reclaiming,” “resisting,” “retro‐casting,” and “landscaping,” which shape the methodological “imaginary.
Barry John Gibson   +2 more
wiley   +1 more source

South Asian Bodies at British Borders in the 1970s: From the Ugandan Asian ‘Stateless Husbands’ to ‘Virginity Testing’

open access: yesGender &History, EarlyView.
ABSTRACT This article looks at two critical moments in British immigration – the case of the ‘stateless’ Ugandan Asian husbands, whose wives successfully argued for their entry in Britain in 1973 and the ‘virginity test’ performed on Mrs K at Heathrow Airport in 1979.
Antara Datta, Jinal Parekh
wiley   +1 more source

Cross-Sensor Fingerprint Matching Method Based on Orientation, Gradient, and Gabor-HoG Descriptors With Score Level Fusion

open access: yesIEEE Access, 2018
The fingerprint is one of the oldest and most widely used biometric modality for person identification. Existing automatic fingerprint matching systems perform well when the same sensor is used for both enrollment and verification (regular matching ...
Helala Alshehri   +3 more
doaj   +1 more source

Theorizing Patriarchy Against a Backdrop of Workplace Sexism and Stress in UK Academia

open access: yesGender, Work &Organization, EarlyView.
ABSTRACT Our analysis investigates the distinct relationship between sexism and workplace stress as experienced by women academics in the UK higher education system. We argue that due to the insufficient literature on this issue there is a limited knowledge base of the harmful psychological effects of stress in the workplace upon women academics in the
Andrew Baron, Charlotte Barrow
wiley   +1 more source

Book Symposium on Gregory of Nyssa's On the Human Image of God: An Appreciation of Responses

open access: yesInternational Journal of Systematic Theology, EarlyView.
Abstract In response to the review essays by Rowan Williams, Morwenna Ludlow, Gabrielle Thomas, Paul Blowers and Martin Laird, this essay by John Behr addresses questions raised about translation methods and the complexities of understanding Gregory's rhetorical style as integral to his mode of writing theology.
John Behr
wiley   +1 more source

From observation to understanding: A multi‐agent framework for smart microscopy

open access: yesJournal of Microscopy, EarlyView.
Abstract Smart microscopy represents a paradigm shift in biological imaging, moving from passive observation tools to active collaborators in scientific inquiry. Enabled by advances in automation, computational power, and artificial intelligence, these systems are now capable of adaptive decision‐making and real‐time experimental control.
P. S. Kesavan, Pontus Nordenfelt
wiley   +1 more source

RSA Cryptographic Key Generation Using Fingerprint Minutiae

open access: yesIraqi Journal for Computers and Informatics, 2014
Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce ...
Mofeed Rashid, Huda Zaki
doaj   +1 more source

Privacy-Friendly Datasets of Synthetic Fingerprints for Evaluation of Biometric Algorithms

open access: yesApplied Sciences, 2023
The datasets of synthetic biometric samples are created having in mind two major objectives: bypassing privacy concerns and compensating for missing sample variability in datasets of real biometric samples.
Andrey Makrushin   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy