Skip to main content
Gait recognition is a technique that identifies or verifies people based upon their walking patterns. Smartwatches, which contain an accelerometer and gyroscope have recently been used to implement gait-based biometrics. However, this... more
    • by 
    •   17  
      BiometricsNeural NetworksForest biometricsBiometrics And Identity
The paper (Foucault Studies, 25 [see link to site*]) builds upon a growing body of critical research on the proliferating use of bibliometrics as a means to evaluate academic research, but brings to it a specifically Foucauldian,... more
    • by  and +1
    •   7  
      BibliometricsBiometricsMichel FoucaultFoucault and education
In this project, an attempt has been made to the development of an authenticated electronic voting system using fingerprint and facial images. The two-fold authentication system improves the security of the voting process and reduces the... more
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceBiometricsFingerprint Recognition
Emotion recognition is one of the important highlights of human emotional intelligence and has long been studied to be incorporated with machine intelligence argued to make machines even more intelligent. This paper aims to contribute to... more
    • by 
    •   20  
      Computer ScienceArtificial IntelligenceEmotional intelligenceBiosensors
We propose a population pharmacokinetic (PK) model with time-dependent covariates measured with errors. This model is used to model S-oxybutynin's kinetics following an oral administration of Ditropan, and allows the distribution rate to... more
    • by 
    •   8  
      StatisticsBiometricsPharmacokineticsBiometry
Biometric based systems for individual authentication are increasingly becoming indispensable for protecting life and property. They provide ways for uniquely and reliably authenticating people, and are difficult to counterfeit. Biometric... more
    • by 
    •   20  
      Cognitive SciencePattern RecognitionModelingBiometrics
Y. Kominami). a v a i l a b l e a t w w w . s c i e n c e d i r e c t . c o m j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / a g r f o r m e t 0168-1923/$ -see front matter # a g r i c u l t u r a l a n d... more
    • by 
    •   40  
      Applied MathematicsEarth SciencesBiomathematicsBiometrics
    • by 
    •   3  
      Computer ScienceUsabilityBiometrics
The Enterprise Excellence (EE) philosophy is a holistic model for leading an enterprise to total excellence by focusing on the needs of the customer whether within the state, the nation, and the world. The rate of change in today's... more
    • by 
    •   5  
      BusinessMarketingBiometricsBusiness Management
The word biometrics refers to the use of physiological or biological characteristics of human to recognize and verify the identity of an individual. Face is one of the human biometrics for passive identification with uniqueness and... more
    • by 
    •   11  
      Artificial IntelligenceImage ProcessingMachine LearningData Mining
In this paper we present a framework for realtime online signature verification scenarios. The proposed framework is based on state-of-the-art feature extraction and Gaussian Mixture Model (GMM) classification. While our signature... more
    • by 
    •   18  
      Computer ScienceForensicsBiometricsSynchronization
The reliable extraction of characteristic gait features from image sequences and their recognition are two important issues in gait recognition. In this paper, we propose a novel two-step, model-based approach to gait recognition by... more
    • by 
    •   10  
      BiometricsHuman Motion Analysishidden Markov modelHuman Identification
The adoption of the Treaty of Lisbon and the granting to the Charter of Fundamental Rights of the same legal force as the Treaty has lent a new impulse to the consideration of fundamental human rights by the European Union (EU). The... more
    • by 
    •   6  
      Computer ScienceLawPrivacyPolitical Science
Most of the existing techniques for palmprint recognition rely on metrics, typically based on static functions, which evaluate the distance between a pair of features. In this paper, we propose a new technique for palmprint verification... more
    • by 
    •   20  
      Dynamical SystemsImage ProcessingInformation SecurityBiometrics
During 1997, quarterly exploratory cruises of the R/V``Archipelago'' were carried out in order to study the deep water crab Chaceon af®nis [Res. Camp. Sci. Mo Ânaco Fasc. VII (1894) 1], South of Pico island (Azores) and at the Menez Gwen... more
    • by 
    •   20  
      ReproductionFisheriesCrustaceaBiology
Aims: To visualize COVID-19 data using Exploratory Data Analysis (EDA) to tell the COVID-19 story expository. Methodology: We included 198 countries (cross-sections) partitioned into 7 WHO regions over 7 months (190 days) time period,... more
    • by  and +1
    • Biometrics
This study aims to establish whether the residential background of consumers has a varying influence on their buying decisions due to the influence of TV advertising.
    • by 
    •   13  
      Distributed ComputingHuman Computer InteractionNetwork SecurityBiometrics
The study of human gait is one of the interesting fields among several disciplines. This arena has attracted researchers and professionals not only from human physiology and neuro biology but has also fascinated scientists from... more
    • by 
    •   4  
      Genetic ProgrammingBiometricsHuman RecognitionHuman Gait
The matching score distributions produced by different biometric modalities are heterogeneous. The same is true for the matching score distributions obtained for different probes. Both of these problems can be addressed by score... more
    • by 
    •   6  
      BiometricsMultimodal BiometricsMultimodal Biometric SystemScore Normalization
Now day’s security of any area is most important task. At different places security required authentication for that purpose biometric system is commonly used. Biometrics is the most suitable means of identifying and authenticating... more
    • by 
    •   5  
      BiometricsFaceFingerprintVoice Recognition
    • by 
    •   2  
      StatisticsBiometrics
    • by 
    •   15  
      MathematicsStatisticsEpidemiologyResearch Design
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this paper, a face recognition system, based on the principal... more
    • by 
    •   14  
      Computer ScienceArtificial IntelligenceImage ProcessingSystem Identification
Competition between contest and scramble strategists was examined using two strains of Callosobruchus maculatus, the contest strain (iQ.) and the scramble strain (tQ). The direct larval interference experiment within each strain showed... more
    • by 
    •   11  
      BiologyBiometricsEcologyResource sharing
Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a... more
    • by 
    •   8  
      Computer ScienceBiometricsCloud SecuritySSO
Iris recognition imaging constraints are receiving increasing attention. There are several proposals to develop systems that operate in the visible wavelength and in less constrained environments. These imaging conditions engender... more
    • by 
    •   19  
      Information SystemsAlgorithmsArtificial IntelligenceImage Processing
User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric trait and unacceptable error rates. Attempting to improve the... more
    • by 
    •   13  
      Cognitive ScienceBiometricsFaceLinear Discriminant Analysis
The diversity and niche specificity of hemi-epiphytic figs in a lowland dipterocarp forest in Sarawak were investigated in 1998. Twenty-seven fig species (264 individuals, c. 120 ha) colonized a diversity of host taxa (35 families), but... more
    • by 
    •   7  
      BiometricsComparative StudyCanopyBiological Sciences
For intelligent service robots, it is essential to recognize users in order to provide appropriate services to a correctly authenticated user. However, in robot environments in which users freely move around the robot, it is difficult to... more
    • by 
    •   12  
      EngineeringComputer ScienceFace RecognitionBiometrics
    • by 
    •   20  
      EngineeringGeographyComputer ScienceArtificial Intelligence
    • by 
    •   6  
      BusinessMarketingEconomicsBiometrics
In many parts of the world, the military has been very busy in recent times engaging in terror and other related wars. This requires that men and materials have to be located in different parts of their strategic geographic centres. And... more
    • by 
    •   5  
      Information SecurityBiometricsAuthenticationManet
In this paper we aim to use the power of Social Engineering to bypass Keystroke Recognition based authentication system. We have designed a virtual chat system (basically a chat bot), coded in Python, which performs the much needed social... more
    • by 
    •   10  
      Computer ScienceInformation SecuritySecurity StudiesBiometrics
The need for clarity in the healthcare management is a matter of frequent discussion and concern among healthcare professionals, practitioners, patients and academicians. Electronic Health Records would provide clarity, transparency,... more
    • by 
    •   5  
      MarketingPsychologyBiometricsBusiness Management
Palm vein authentication is one of the modern biometric techniques, which employs the vein pattern in the human palm to verify the person. The merits of palm vein on classical biometric (e.g. fingerprint, iris, face) are a low risk of... more
    • by 
    •   6  
      BiometricsPersonal IdentificationGabor FilterPalm-vein Recognition
Microalgae and larval feeding in mollusc hatchery In mollusc hatchery the production of living phytoplancton is widely used to feed bivalve larvae. However, to be suitable, the algal cells must have a proper size, have an adequate... more
    • by 
    •   6  
      NutritionProductionBiometricsAquaculture
The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses,... more
    • by 
    •   12  
      EngineeringMechanical EngineeringSoil ScienceEconometrics
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been... more
    • by 
    •   10  
      Network SecurityThe Internet of ThingsBiometricsMatlab
The rapid spread of electronic fingerprinting not only creates new regimes of surveillance but compels users to adopt novel ways of performing their bodies to suit the new technology. This ethnography uses two Indian case studies-of a... more
    • by 
    •   4  
      GovernanceBiometricsTechnology and SocietyIndia
    • by 
    •   5  
      BiometricsDryingDomesticationFruits
Over the internet today, communication and computing environments are significant aspect for everyone. Then in order to secure our communication from the unauthorized access the network and different enemies we should apply biometric... more
    • by 
    •   5  
      Parallel ComputingArtificial IntelligenceBiometricsArtificial Neural Networks
Dr. Mrs. Ravi Kiran School of Management & Social Sciences, Thapar University Patiala, India E-mail: [email protected] Abstract Financial markets are constantly becoming more efficient by providing more promising solutions to the... more
    • by 
    •   9  
      BusinessMarketingEconomicsBiometrics
Voice biometric feature extraction is the core task in developing any speaker identification system. This paper proposes a robust feature extraction technique for the purpose of speaker identification. The technique is based on processing... more
    • by 
    •   3  
      Computer ScienceBiometricsBiochemistry and cell biology
Biometrics is a rapidly evolving technology which is being widely used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be... more
    • by 
    •   5  
      EngineeringBiometricsCryptographyPattern Matching
Recently, several papers have proposed pseudo dynamic methods for automatic handwritten signature verification. Each of these papers uses texture measures of the gray
    • by 
    •   17  
      Pattern RecognitionBiometricsSupport Vector MachinesDatabases
Social infection is a major contribution for human disaster. Biometric devices are to verify one's identity for each and every one is having unique biological traits. In many circumstances, recording the identification through fingerprint... more
    • by  and +1
    • Biometrics
Security has become a major issue globally and in order to manage the security challenges and reduce the security risks in the world, biometric systems such as face detection and recognition systems have been built. These systems are... more
    • by 
    •   5  
      Information SecurityFacial RecognitionFace RecognitionBiometrics
E xtracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and... more
    • by 
    •   21  
      Signal ProcessingPattern RecognitionBiometricsProceedings
The development of systems capable of recognizing and categorising emotions is of interest to researchers in various scientific areas including artificial intelligence. The traditional notion that emotions and rationality are two separate... more
    • by  and +1
    •   73  
      Instrumentation EngineeringBioinformaticsPhysiologyHuman Physiology