Results 51 to 60 of about 42,583 (195)

Fingerprint recognition system to verify the identity of a person using an online database [PDF]

open access: yes, 2012
Our B.Tech project emphasize on the current techniques for the fingerprint recognition. Human fingerprint exhibit some certain details marked on it. We categorized it as minutiae, which can be used as a unique identity of a person if we recognize it in a
Gouda, Himanshu Sekhar, Kumar, Manish
core  

Gricean metacommunication

open access: yesMind &Language, EarlyView.
Three main approaches exist for finessing the cognitive demands of Grice's model of communication (a notorious problem): namely, deflationism, modularity, and interpretivism. Here, I consider each in light of human metacommunication, a phenomenon that has been neglected in foundational discussions of Gricean communication.
Ronald J. Planer
wiley   +1 more source

Extracción de características identificativas en plantillas de minucias mediante la estructura compleja

open access: yesRevista Cubana de Ciencias Informáticas, 2015
Identifying people using biometric features such as ngerprints, it is considered a secure authentication me- chanism. Cryptographic systems proposed for the protection template ngerprint minutiae need to perform the alignment process of
Ramón Santana Fernández   +2 more
doaj  

Solution for Public Smart Dispenser Using Digital Payment Based on the Fingerprint Minutiae Algorithm

open access: yesJOIV: International Journal on Informatics Visualization
Technological advancements have significantly focused on secure and efficient digital payments. In the context of Public Smart Dispensers (PSDs), using authentication and verification in payment transactions is crucial to address security concerns ...
Jumadi Mabe Parenreng   +5 more
doaj   +1 more source

Combining multiple biometrics to protect privacy [PDF]

open access: yes, 2004
As biometrics are gaining popularity, there is increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The association of fingerprints with criminals raises further concerns.
Kholmatov, Alisher Anatolyevich   +2 more
core  

Generative Convolutional Networks for Latent Fingerprint Reconstruction

open access: yes, 2017
Performance of fingerprint recognition depends heavily on the extraction of minutiae points. Enhancement of the fingerprint ridge pattern is thus an essential pre-processing step that noticeably reduces false positive and negative detection rates.
Bronstein, Michael M.   +2 more
core   +1 more source

Civilizing the Nation: Travel, Civility and Bourgeois Nationalism in Israel

open access: yesNations and Nationalism, EarlyView.
ABSTRACT This article reads The Lapid Guide to Europe, a bestselling Hebrew‐language travel guide published from the 1970s to the 1990s, as a form of bourgeois nationalism enacted through everyday practices of behaviour. Written by journalist and Holocaust survivor Tommy Lapid, the guide operated as civic pedagogy, instructing Israeli travellers in ...
Daniel Mahla
wiley   +1 more source

Institutional Logics Versus Norm Circles: Alternative or Complementary Approaches to the Analysis of Institutions?

open access: yesJournal for the Theory of Social Behaviour, Volume 56, Issue 2, June 2026.
ABSTRACT The institutional logics and norm circle perspectives have emerged as two approaches to the analysis of institutions in organisations and society. This paper compares the two perspectives and asks whether they should be seen as alternative or complementary approaches.
Sven Modell
wiley   +1 more source

The ‘Grammars’ of Power and Racialisation: Supporting the Co‐Design of an Antiracist English and Literacy Education Through Critical Alliances

open access: yesLiteracy, Volume 60, Issue 2, May 2026.
ABSTRACT In this article, we report on a series of professional development (PD) workshops, focusing on its design and emerging ‘grammars’ of power and racialisation that serve as a toolkit for schools. Bringing together scholarship in critical literacies, antiracist education, and racial semiotics, we conduct a critical socio‐material analysis of the ...
Navan Govender   +3 more
wiley   +1 more source

A B-Spline Function Based 3D Point Cloud Flattening Scheme for 3D Fingerprint Recognition and Identification

open access: yesIEEE Open Journal of the Computer Society
3D fingerprint-based recognition and identification have several advantages compared to conventional 2D recognition systems. It is hygienic and secure due to its contactless sample collection.
Mohammad Mogharen Askarin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy