Academic literature on the topic 'Biometric verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric verification"

1

Srivastava, Prateek, and Rohit Srivastava. "A Multimodal Based Approach for Face and Unique Mark Based Combination for Confirmation of Human." International Journal of Business Analytics 6, no. 3 (2019): 16–28. http://dx.doi.org/10.4018/ijban.2019070102.

Full text
Abstract:
Biometric processes are utilized for recognition and distinguishing a person for different applications. The procedure is made possible by utilizing single biometric highlight or a mix of biometric highlights. In the event that the distinguishing proof is finished by utilizing a solitary biometric highlight (confront, iris, finger, palm, and so forth) then the framework is called unimodal, and if a combnation of biometrics are utilized then it is called multimodal. In a multimodal framework compared to the different downsides of a unimodal framework (noisy data, multiple vectors and so forth)
APA, Harvard, Vancouver, ISO, and other styles
2

Mudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.

Full text
Abstract:
In recent years large number of emerging automated applications faces the need to have recognition abilities of persons using their own self biometrics, before they can access the applications services. Nowadays, Biometric recognition is used, it can be used as automatic identification or automatic verification of persons based on their physiological or behavioral characteristics. There are no perfect biometric measurements;each biometry has its advantages and limitations. Each biometry requires specific vital identity to answer the identification or verification question. The suitability of a
APA, Harvard, Vancouver, ISO, and other styles
3

Jadhav, Angarika, and Prof N. M. Shahane. "Privacy Preserving Biometric Verification." International Journal of Engineering Research 3, no. 1 (2014): 6–8. http://dx.doi.org/10.17950/ijer/v3s1/102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ramana N., Venkata, S. Anu H. Nair, and K. P. Sanal Kumar. "Modified Firefly Optimization with Deep Learning based Multimodal Biometric Verification Model." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (2022): 99–107. http://dx.doi.org/10.17762/ijritcc.v10i1s.5798.

Full text
Abstract:
Biometric security has become a main concern in the data security field. Over the years, initiatives in the biometrics field had an increasing growth rate. The multimodal biometric method with greater recognition and precision rate for smart cities remains to be a challenge. By comparison, made with the single biometric recognition, we considered the multimodal biometric recognition related to finger vein and fingerprint since it has high security, accurate recognition, and convenient sample collection. This article presents a Modified Firefly Optimization with Deep Learning based Multimodal B
APA, Harvard, Vancouver, ISO, and other styles
5

Medjahed, Chahreddine, Abdellatif Rahmoun, Christophe Charrier, and Freha Mezzoudj. "A deep learning-based multimodal biometric system using score fusion." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65. http://dx.doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work propos
APA, Harvard, Vancouver, ISO, and other styles
6

Chahreddine, Medjahed, Rahmoun Abdellatif, Charrier Christophe, and Mezzoudj Freha. "A deep learning-based multimodal biometric system using score fusion." International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65–80. https://doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work propos
APA, Harvard, Vancouver, ISO, and other styles
7

Joseph, Annie Anak, Alex Ng Ho Lian, Kuryati Kipli, et al. "Person Verification Based on Multimodal Biometric Recognition." Pertanika Journal of Science and Technology 30, no. 1 (2021): 161–83. http://dx.doi.org/10.47836/pjst.30.1.09.

Full text
Abstract:
Nowadays, person recognition has received significant attention due to broad applications in the security system. However, most person recognition systems are implemented based on unimodal biometrics such as face recognition or voice recognition. Biometric systems that adopted unimodal have limitations, mainly when the data contains outliers and corrupted datasets. Multimodal biometric systems grab researchers’ consideration due to their superiority, such as better security than the unimodal biometric system and outstanding recognition efficiency. Therefore, the multimodal biometric system bas
APA, Harvard, Vancouver, ISO, and other styles
8

Juluri, Samatha, and Madhavi G. "SecureSense: Enhancing Person Verification through Multimodal Biometrics for Robust Authentication." Scalable Computing: Practice and Experience 25, no. 2 (2024): 1040–54. http://dx.doi.org/10.12694/scpe.v25i2.2524.

Full text
Abstract:
Biometrics provide enhanced security and convenience compared to conventional methods of individual authentication. A more robust and effective method of individual authentication has emerged due to recent advancements in multimodal biometrics. Unimodal systems offer lower security and lack the robustness found in multimodal biometric systems. The research paper introduces a novel approach, employing multiple biometric modalities, including face, fingerprint, and iris, to authenticate users in a multimodal biometric system. The paper proposes the ”Secure Sense” framework, which combines multip
APA, Harvard, Vancouver, ISO, and other styles
9

Tiwari, Shrikant, and Sanjay Kumar Singh. "Newborn Verification Using Headprint." Journal of Information Technology Research 5, no. 2 (2012): 15–30. http://dx.doi.org/10.4018/jitr.2012040102.

Full text
Abstract:
Missing, swapping, mixing, and illegal adoption of newborns is a worldwide challenge and research done to resolve this issue is minimal and least reported in the literature. Most of the biometric systems developed are for adults and very few of them address the issue of newborn identification. The headprint of a newborn is an important source of data for passive recognition, as they are non cooperative users of biometrics. The objective of this paper is to demonstrate the concept of using headprint recognition for verification of newborns. The main contributions of the research are: (1) The pr
APA, Harvard, Vancouver, ISO, and other styles
10

Jabin, Suraiya, and Farhana Javed Zareen. "Biometric signature verification." International Journal of Biometrics 7, no. 2 (2015): 97. http://dx.doi.org/10.1504/ijbm.2015.070924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometric verification"

1

Sigurnjak, S. K. "Biometric verification using gait." Thesis, Manchester Metropolitan University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.592681.

Full text
Abstract:
The work presented within this document details the development of a novel gait verification system suitable for a variety of applications such as human motion studies, medical analysis and security situations. The human gait is a spatio temporal process involving the coordination and interaction between the nervous, skeletal and muscular systems. Due to inherent variations in the limb lengths, muscle strengths and body mass gait is inherently individual. To develop a suitable feature extraction process a virtual gait laboratory was developed. The virtual laboratory contains virtual character
APA, Harvard, Vancouver, ISO, and other styles
2

Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.

Full text
Abstract:
Ce travail de thèse vise à régénérer des clés crypto-biométriques (clés cryptographiques obtenues avec des données biométriques) résistantes aux méthodes de cryptanalyse quantique. Le défi est d'obtenir des clés avec une haute entropie pour avoir un haut niveau de sécurité, sachant que l'entropie contenue dans les références biométriques limite l'entropie de la clé. Notre choix a été d'exploiter la biométrie faciale.Nous avons d'abord créé un système de reconnaissance faciale de pointe basé en utilisant des bases de données publiques. Notre architecture utilise des réseaux de neurones profonds
APA, Harvard, Vancouver, ISO, and other styles
3

Salaiwarakul, Anongporn. "Verification of secure biometric authentication protocols." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1166/.

Full text
Abstract:
The thesis presents verification of biometric authentication protocols. ProVerif is used as the verification tool for verifying and analysing the protocols. The protocol are analysed in ProVerif model. Various attacks to the protocols are generated in order to verify whether the protocols hold their intended properties. We have selected three biometric authentication protocols and proposed a remote biometric authentication protocol for on-line banking. Each of which has different intended purposes and properties. The first protocol is generic authentication using biometric data. This protocol
APA, Harvard, Vancouver, ISO, and other styles
4

Opperman, Charl Anton. "Peer-to-peer biometric verification using nfc-enabled smartphones." Diss., University of Pretoria, 2014. http://hdl.handle.net/2263/79300.

Full text
Abstract:
The current approach for person identification consists of handing over a paper ID document which consists only of a picture of the person’s face, usually at a much younger age. Human intuition provides the means to make a comparison between the person in the picture and the person handing over the document. With the rise in personal electronic devices such as smartphones and tablets, alternative solutions such as mobile biometrics have become feasible especially since these security mechanisms are also being studied as solutions to securing the mobile devices themselves from unauthorised logi
APA, Harvard, Vancouver, ISO, and other styles
5

Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be
APA, Harvard, Vancouver, ISO, and other styles
6

Chan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
7

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Full text
Abstract:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began
APA, Harvard, Vancouver, ISO, and other styles
8

ALI, ARSLAN. "Deep learning techniques for biometric authentication and robust classification." Doctoral thesis, Politecnico di Torino, 2021. http://hdl.handle.net/11583/2910084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sanderson, Conrad. "Automatic Person Verification Using Speech and Face Information." Thesis, Griffith University, 2003. http://hdl.handle.net/10072/367191.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be
APA, Harvard, Vancouver, ISO, and other styles
10

Kabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.

Full text
Abstract:
Dans son contexte spécifique, le terme « biométrie » est souvent associé à l'étude des caractéristiques physiques et comportementales des individus afin de parvenir à leur identification ou à leur vérification. Ainsi, le travail développé dans cette thèse nous a conduit à proposer un algorithme d'identification robuste, en considérant les caractéristiques intrinsèques des phalanges de la main. Considérée comme une biométrie cachée, cette nouvelle approche peut s'avérer intéressante, notamment lorsqu'il est question d'assurer un niveau de sécurité élevé, robuste aux différentes attaques qu'un s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometric verification"

1

Vacca, John R. Biometric technologies and verification systems. Butterworth-Heinemann/Elsevier, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

L, Wilson C. Simple test procedure for image-based biometric verification systems. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

National Institute of Standards and Technology (U.S.), ed. Interfaces for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sangyōshō, Japan Keizai. Compatibility verification of e-passport for immigration control. Ministry of Economy, Trade and Industry, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ashbourn, Julian. Biometrics: Advanced Identity Verification. Springer London, 2000. http://dx.doi.org/10.1007/978-1-4471-0747-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vacca, John R. Biometric Technologies and Verification Systems. Elsevier Science & Technology Books, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

U.S. Department of Commerce. Biometric Data Specification for Personal Identity Verification. CreateSpace Independent Publishing Platform, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Science of Biometrics: Security Technology for Identity Verification. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Ravindra. Science of Biometrics: Security Technology for Identity Verification. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Das, Ravindra. Science of Biometrics: Security Technology for Identity Verification. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometric verification"

1

Ashbourn, Julian. "Biometric methodologies." In Biometrics: Advanced Identity Verification. Springer London, 2000. http://dx.doi.org/10.1007/978-1-4471-0747-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Xiaojun, Yang Wang, Weilin Zhang, Song Ding, and Wuming Jiang. "Deep CNNs for Face Verification." In Biometric Recognition. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46654-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maio, Dario, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain. "FVC2004: Third Fingerprint Verification Competition." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meena, Bhola Ram, Mayank Vatsa, Richa Singh, and Phalguni Gupta. "Iris Based Human Verification Algorithms." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Wen, and Shiguang Shan. "Face Verification for Access Control." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yeung, Dit-Yan, Hong Chang, Yimin Xiong, et al. "SVC2004: First International Signature Verification Competition." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kerschbaum, Florian, Mikhail J. Atallah, David M’Raïhi, and John R. Rice. "Private Fingerprint Verification without Local Storage." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tran, Dat. "Fuzzy Normalisation Methods for Pattern Verification." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zheng, Wenna, and Junlin Hu. "Kinship Verification via Reference List Comparison." In Biometric Recognition. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86608-2_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Zhaoxiang, Kaiyue Wang, and Yunhong Wang. "A Survey of On-line Signature Verification." In Biometric Recognition. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25449-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric verification"

1

Sawhney, Ishita, Saurabh Kumar Singh, and Shilpi Sharma. "Biometric Verification Using Blockchain and Quantum Computing." In 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS). IEEE, 2024. https://doi.org/10.1109/ictacs62700.2024.10840605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shakir, Shukur H., and Alharith A. Abdullah. "ZeroPrint Verification: Efficient Biometric Proofs for Secure Elections." In 2024 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). IEEE, 2024. https://doi.org/10.1109/apwimob64015.2024.10792954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chiu, Jui-Kun, Tzu-Yun Lin, Wei-Shen Hsu, and Shun-Chi Wu. "Two-Factor Biometric Verification with ECG: Two Cancelable Approaches." In 2024 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2024. https://doi.org/10.1109/embc53108.2024.10781637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tandon, Abhishek, Geetanjali Sharma, Gaurav Jaswal, Aditya Nigam, and Raghavendra Ramachandra. "Synthetic Forehead-creases Biometric Generation for Reliable User Verification." In 2024 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2024. http://dx.doi.org/10.1109/ijcb62174.2024.10744453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

P, Kavinkumar S., Sujith K, Gokul K, and Premalatha K. "Smart attendance System using Bluetooth Beacon with Biometric Verification." In 2025 3rd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA). IEEE, 2025. https://doi.org/10.1109/icaeca63854.2025.11012141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hube, Jens Peter. "Using Biometric Verification to Estimate Identification Performance." In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 2006. http://dx.doi.org/10.1109/bcc.2006.4341620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Karabat, Cagatay, and Hakan Erdogan. "A Cancelable Biometric Hashing for Secure Biometric Verification System." In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aziz, Sumair, Muhammad Mustafa Hayat, Syed Zohaib Hassan Naqvi, Muhammad Furqan, Muhammad Umar Khan, and Muhammad Zubair Zahid. "Electrocardiography based Biometric Verification System." In 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). IEEE, 2020. http://dx.doi.org/10.1109/icecce49384.2020.9179312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

George, Susan E. "Biometric verification in dynamic writing." In AeroSense 2002, edited by Harold H. Szu and James R. Buss. SPIE, 2002. http://dx.doi.org/10.1117/12.458744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tolosana, Ruben, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez, and Javier Ortega-Garcia. "Complexity-Based Biometric Signature Verification." In 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR). IEEE, 2017. http://dx.doi.org/10.1109/icdar.2017.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric verification"

1

Carlson, J. J., A. M. Bouchard, G. C. Osbourn, et al. Sensor-fusion-based biometric identity verification. Office of Scientific and Technical Information (OSTI), 1998. http://dx.doi.org/10.2172/573302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grother, Patrick, Wayne Salamon, and Ramaswamy Chandramouli. Biometric Specifications for Personal Identity Verification. National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.sp.800-76-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wilson, C. L., P. J. Grother, and R. Chandramouli. Biometric data specification for personal identity verification. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilson, C. L., P. J. Grother, and R. Chandramouli. Biometric data specification for personal identity verification. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-76-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wilson, C. L., and R. M. McCabe. Simple test procedure for image-based biometric verification systems. National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!