Academic literature on the topic 'Biometry implementation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometry implementation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometry implementation"

1

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
APA, Harvard, Vancouver, ISO, and other styles
2

Wilhelm, Martin. "Project Management in Pharmaceutical Biometry and Data Management: Conception, Implementation, and Operations." Drug Information Journal 32, no. 1 (January 1998): 221–28. http://dx.doi.org/10.1177/009286159803200130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonditti, Philippe. "From Territorial Space to Networks: A Foucaldian Approach to the Implementation of Biometry." Alternatives: Global, Local, Political 29, no. 4 (October 2004): 465–82. http://dx.doi.org/10.1177/030437540402900405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kurmanavicius, J., T. Burkhardt, D. Balsyte, L. Schäffer, and R. Zimmermann. "OP29.01: Implementation of the cumulative sum (CUSUM) technique for fetal ultrasound biometry quality control." Ultrasound in Obstetrics and Gynecology 36, S1 (October 2010): 136. http://dx.doi.org/10.1002/uog.8196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meyer, JayJ, HansR Vellara, Riyaz Bhikoo, LucillaAh-Ching Sefo, Salome Lolokabaira, NeilL Murray, and CharlesN J. McGhee. "Improved refractive outcomes of small-incision extracapsular cataract surgery after implementation of a biometry training course." Middle East African Journal of Ophthalmology 26, no. 1 (2019): 17. http://dx.doi.org/10.4103/meajo.meajo_3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hryaschev, V., and Aleksey Nenashev. "Efficiency of the implementation of the peer-to-peer distributed system for securable information storage and processing (TheOOL Project)." Modeling of systems and processes 14, no. 3 (September 22, 2021): 82–89. http://dx.doi.org/10.12737/2219-0767-2021-14-3-82-89.

Full text
Abstract:
methodology of evaluation of efficiency of the implementation at industrial enterprises of “peer-to-peer distributed systems of storage and processing of protected information in enterprise networks” has been proposed. The efficiency evaluation is based on the comparison of the indicators of reliability, fault tolerance, and total cost of ownership of the implementation of corporate information systems within the proposed system and its possible alternatives. The “peer-to-peer distributed system of storage and processing of protected information” is designed for the protection of distributed computing and incapsulation of private networks without restricting possibilities for usable interactions in the process of implementation of Industry 5.0 and Super Smart Society technologies. When these concepts get implemented in an enterprise, manufacture, logistics, and sales are merged into a global geographically and organizationally distributed information system for data exchange, which functions on top of the Internet. The proposed system offers tools for setting up distributed computing, and it ensures an effective response to threats by applying cryptography, unauthorized access protection with the use of biometry and an innovative protocol for information exchange and control of topology powered by distributed ledger technology, while also optimizing the utilization of computing capacity.
APA, Harvard, Vancouver, ISO, and other styles
7

Williams, Mandy, Sue Turner, Emily Butler, and Jason Gardosi. "Fetal growth surveillance – Current guidelines, practices and challenges." Ultrasound 26, no. 2 (March 22, 2018): 69–79. http://dx.doi.org/10.1177/1742271x18760657.

Full text
Abstract:
Antenatal surveillance of fetal growth is an essential part of good maternity care, as lack of detection of fetal growth restriction is directly associated with stillbirth and perinatal morbidity. New algorithms and guidelines provide care pathways which rely on regular third trimester ultrasound biometry and plotting of estimated fetal weight in pregnancies considered to be at increased risk, and their implementation has increased pressures on ultrasound resources. Customised growth charts have improved the distinction between constitutional and pathological smallness and reduced unnecessary referrals. Their introduction, together with clinicians' training, e-learning and audit as the key elements of the growth assessment protocol, has resulted in increased antenatal detection of small for gestational age babies and a reduction in avoidable stillbirths. However, missed case audits highlight that further improvements are needed, and point to the need to address quality assurance and resource issues in ultrasound services.
APA, Harvard, Vancouver, ISO, and other styles
8

KAVADAS, S., D. DAMALAS, S. GEORGAKARAKOS, C. MARAVELIAS, G. TSERPES, C. PAPACONSTANTINOU, and G. BAZIGOS. "IMAS-Fish: Integrated MAnagement System to support the sustainability of Greek Fisheries resources. A multidisciplinary web-based database management system: implementation, capabilities, utilization and future prospects for fisheries stakeholde." Mediterranean Marine Science 14, no. 1 (March 4, 2013): 109. http://dx.doi.org/10.12681/mms.324.

Full text
Abstract:
This article describes in detail the “IMAS-Fish” web-based tool implementation technicalities and provides examples on how can it be used for scientific and management purposes setting new standards in fishery science. “IMAS-Fish” was developed to support the assessment of marine biological resources by: (i) homogenizing all the available datasets under a relational database, (ii) facilitating quality control and data entry, (iii) offering easy access to raw data, (iv) providing processed results through a series of classical and advanced fishery statistics algorithms, and (v) visualizing the results on maps using GIS technology. Available datasets cover among others: Fishery independent experimental surveys data (locations, species, catch compositions, biological data); Commercial fishing activities (fishing gear, locations, catch compositions, discards); Market sampling data (species, biometry, maturity, ageing); Satellite derived ocean data (Sea surface temperature, Salinity, Wind speed, Chlorophyll-a concentrations, Photosynthetically active radiation); Oceanographic parameters (CTD measurements); Official national fishery statistics; Fishing fleet registry and VMS data; Fishing ports inventory; Fishing legislation archive (national and EU); Bathymetry grids. Currently, the homogenized database holds a total of more than 100,000,000 records. The web-based application is accessible through an internet browser and can serve as a valuable tool for all involved stakeholders: fisheries scientists, state officials responsible for management, fishermen cooperatives, academics, students and NGOs.
APA, Harvard, Vancouver, ISO, and other styles
9

Wysokinska, Zofia, and Radosław Dziuba. "Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland." Comparative Economic Research. Central and Eastern Europe 14, no. 4 (May 11, 2012): 117–50. http://dx.doi.org/10.2478/v10103-011-0030-2.

Full text
Abstract:
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.
APA, Harvard, Vancouver, ISO, and other styles
10

Haux, R., and S. Koch. "Improving Bridging from Informatics Theory to Practice." Applied Clinical Informatics 06, no. 04 (2015): 748–56. http://dx.doi.org/10.4338/aci-2015-10-ra-0147.

Full text
Abstract:
SummaryBackground: In 1962, Methods of Information in Medicine (MIM) began to publish papers on the methodology and scientific fundamentals of managing data, information, and knowledge in biomedicine and health care. Meeting an increasing demand for research about practical implementation of health information systems, the journal Applied Clinical Informatics (ACI) was launched in 2009. Both journals are official journals of the International Medical Informatics Association (IMIA).Objectives: Based on prior analyses, we aimed to describe major topics published in MIM during 2014 and to explore whether theory of MIM influenced practice of ACI. Our objectives were further to describe lessons learned and to discuss possible editorial policies to improve bridging from theory to practice.Methods: We conducted a retrospective, observational study reviewing MIM articles published during 2014 (N=61) and analyzing reference lists of ACI articles from 2014 (N=70). Lessons learned and opinions about MIM editorial policies were developed in consensus by the two authors. These have been influenced by discussions with the journal’s associate editors and editorial board members.Results: The publication topics of MIM in 2014 were broad, covering biomedical and health informatics, medical biometry and epidemiology. Important topics discussed were biosignal interpretation, boosting methodologies, citation analysis, health-enabling and ambient assistive technologies, health record banking, safety, and standards. Nine ACI practice articles from 2014 cited eighteen MIM theory papers from any year. These nine ACI articles covered mainly the areas of clinical documentation and medication-related decision support. The methodological basis they cited from was almost exclusively related to evaluation. We could show some direct links where theory impacted practice. These links are however few in relation to the total amount of papers published.Conclusions: Editorial policies such as publishing systematic methodological reviews and clarification of possible practical impact of theory-focused articles may improve bridging.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometry implementation"

1

Varadinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.

Full text
Abstract:
This diploma thesis deals with fingerprint recognition applied in personal computers. The topic is analyzed both chronologically in historical context and in connection with other biometric methods. The thesis provides a comprehensive survey of the topic. It starts with physical layer, goes through hardware parts and ends with software architecture. A special attention is paid to programming fingerprint recognition support into end-user applications. These are the aims of the thesis: to place the silicon fingerprint sensing technology into the historical context and describe its evolution in connection with personal computers till the present times, to provide the results of market research of fingerprint sensors used in personal computers, to work out the summary of the functions the end-users have at their disposal, to present the market research results of fingerprint software, to work out the overview and the comparison of available software development kits (SDKs) and that of application programming interfaces (APIs) used for the described fingerprint sensor devices, and last but not least to develop a demonstration application that communicates with a fingerprint sensor device. Technical literature, market researches together with my own experience from the work in this field were used so as to meet the set aims. As for the demo application of this technology it is my own innovative approach. The thesis is divided into seven chapters where Chapter II -- Chapter VI directly deal with the mentioned topics. The completion of a missing angle of approach to the subject from end-users' and application programmers' perspective is the main asset of this thesis. The work also allows orientation on the silicon fingerprint sensor market and fingerprint software market. Moreover it shows possibilities how to extend this technology, it provides a detailed analysis of the software layer and presents programming samples showing that show how to use this technology. The demo application allowing audio volume control by a fingerprint device is an innovation in the branch of computer input devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Shenglin. "Design and implementation for secure enbedded biometric authentication systems." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1317343341&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ndlangisa, Mboneli. "DRUBIS : a distributed face-identification experimentation framework - design, implementation and performance issues." Thesis, Rhodes University, 2004. http://eprints.ru.ac.za/93/1/MNdlangisa-MSc.pdf.

Full text
Abstract:
We report on the design, implementation and performance issues of the DRUBIS (Distributed Rhodes University Biometric Identification System) experimentation framework. The Principal Component Analysis (PCA) face-recognition approach is used as a case study. DRUBIS is a flexible experimentation framework, distributed over a number of modules that are easily pluggable and swappable, allowing for the easy construction of prototype systems. Web services are the logical means of distributing DRUBIS components and a number of prototype applications have been implemented from this framework. Different popular PCA face-recognition related experiments were used to evaluate our experimentation framework. We extract recognition performance measures from these experiments. In particular, we use the framework for a more indepth study of the suitability of the DFFS (Difference From Face Space) metric as a means for image classification in the area of race and gender determination.
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Jia-hua, and 呂佳樺. "Design and Hardware Implementationof a Secure Bi-Modal Biometric System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/28374139282307261375.

Full text
Abstract:
碩士
義守大學
電機工程學系碩士班
94
In recent years, biometrics has become an important topic for public safety and information security. This technique relies on human appearances and behavioral characteristics to identify or verify a person’s identity. However, the performance of single modal biometric system is usually degraded due to the environmental influence or the physiological defect. In this thesis, we design a bi-modal biometric system based on face/iris biometric decision fusion in view of improving substantially the recognition performance and the security in a biometric authentication system. In the proposed method, the feature vectors of face modal and iris modal are verified respectively by two independent PNN neural networks. The inference probabilities of the PNN are integrated into a fuzzy neural network classifier which will output the final verification decision. Our experiment reveals an excellent performance by the bi-modal biometrics (EER=0.823%), which is highly superior to the face biometrics (EER=2.62%) and the iris biometrics (EER=2.21%). We implement finally the proposed bi-modal biometric system on a FPGA single chip by means of the high-level hardware synthesis.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Biometry implementation"

1

Adaptive design theory and implementation using SAS and R. Boca Raton: CRC Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Mark. Adaptive design theory and implementation using SAS and R. Boca Raton, FL: CRC Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adaptive design theory and implementation using SAS and R. Boca Raton: Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ashbourn, Julian. Practical biometrics: From aspiration to implementation. London: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Transportation Worker Identification Credential (TWIC) implementation: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, first session, April 12, 2007. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Implementation of an entry-exit system: Still waiting after all these years : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, November 13, 2013. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Government Accountability Office. Homeland security: Agency plans, implementation, and challenges regarding the national strategy for homeland security : report to the chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kisku, Dakshina Ranjan. Design and Implementation of Healthcare Biometric Systems. IGI Global, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ashbourn, Julian. Practical Biometrics: From Aspiration to Implementation. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Practical Biometrics: From Aspiration to Implementation (Springer Professional Computing). Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Biometry implementation"

1

Sonar, Roshani Ashok, Hemraj V. Dhande, Vijay D. Chaudhari, and H. T. Ingale. "Implementation of E-Health Record with Biometric Authentication." In Applied Computer Vision and Image Processing, 415–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4029-5_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

López-Ongil, Celia, Raul Sanchez-Reillo, Judith Liu-Jimenez, Fernando Casado, Leslie Sánchez, and Luis Entrena. "FPGA Implementation of Biometric Authentication System Based on Hand Geometry." In Field Programmable Logic and Application, 43–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30117-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Waggett, Peter, and Fred Preston. "Implementation Profiles and Code of Practice for Implementing Biometric Systems." In Encyclopedia of Biometrics, 1–4. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_9043-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khandelwal, Sarika, and P. C. Gupta. "Implementation of Secure Biometric Fuzzy Vault Using Personal Image Identification." In Advances in Intelligent Systems and Computing, 311–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13728-5_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Waggett, Peter, and Fred Preston. "Implementation Profiles and the Code of Practice for Implementing Biometric Systems." In Encyclopedia of Biometrics, 909–12. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_9043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chung, Yongwha, Daesung Moon, Sung Bum Pan, Min Kim, and Kichul Kim. "A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems." In Lecture Notes in Computer Science, 770–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30126-4_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liashenko, Galyna, and Andrii Astrakhantsev. "Implementation Biometric Data Security in Remote Authentication Systems via Network Steganography." In Advances in Information and Communication Technology and Systems, 257–73. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58359-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choudhary, Pushpa, Ashish Tripathi, Arun Kumar Singh, and Prem Chand Vashist. "Implementation of Integrated Security System by Using Biometric Function in ATM Machine." In Intelligent Computing in Engineering, 33–42. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2780-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, W. C., H. M. Yeap, K. J. Chee, and D. A. Ramli. "Towards Real Time Implementation of Sparse Representation Classifier (SRC) Based Heartbeat Biometric System." In Lecture Notes in Electrical Engineering, 189–202. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03967-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fazendeiro, Paulo, Chandrashekhar Padole, Pedro Sequeira, and Paula Prata. "OpenCL Implementations of a Genetic Algorithm for Feature Selection in Periocular Biometric Recognition." In Swarm, Evolutionary, and Memetic Computing, 729–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35380-2_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometry implementation"

1

Garg, Ram Kumar, and N. K. Garg. "Developing secured biometric payments model using Tokenization." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaramillo, Paola, Adam Shoemaker, William Burks, Michelle Tran, and Alexander Leonessa. "Development of Electromagnetic Stimulation System as Treatment for Muscle Activation." In ASME 2013 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/dscc2013-3911.

Full text
Abstract:
The presented work addresses the implementation of electromagnetic stimulation with feedback control. Preliminary testing is conducted as a proof of principle to evaluate the feasibility of the experimental system for future in vitro experiments on mice muscle. Therefore, this study focuses on applying a Proportional-Integral controller to carry out contractions of a BioMetal Fiber based on set trajectories specified to the control algorithm. The experimental setup captures the instantaneous position of the BioMetal Fiber, which is used as feedback and modulated via high frequency electromagnetic fields. Consequently, the effectiveness of the controller and the two-coil electromagnetic system are evaluated to develop improved strategies for system tracking.
APA, Harvard, Vancouver, ISO, and other styles
3

Abou elazm, Lamiaa A., Sameh Ibrahim, Mohamed G. Egila, H. Shawkey, Mohamed K. H. Elsaid, Walid El-Shafai, and Fathi E. Abd El-Samie. "Hardware Implementation of Cancellable Biometric Systems." In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2020. http://dx.doi.org/10.1109/i-smac49090.2020.9243390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tamezheneal, R., and S. Sumathi. "Implementation of biometrie smart card using multibiometrics." In 2017 International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2017. http://dx.doi.org/10.1109/icoei.2017.8300810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu-Jimenez, Judith, Raul Sanchez-Reillo, Almudena Lindoso, and Oscar Miguel-Hurtado. "FPGA implementation for an iris biometric processor." In 2006 IEEE International Conference on Field Programmable Technology. IEEE, 2006. http://dx.doi.org/10.1109/fpt.2006.270324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jamdar, Shradha D., and Yogesh Golhar. ""Implementation of unimodal to multimodal biometrie feature level fusion of combining face iris and ear in multi-modal biometric system"." In 2017 International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2017. http://dx.doi.org/10.1109/icoei.2017.8300778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prasad, M. R., and T. C. Maniunath. "Proposed Biometric Iris Recognition System Implementation Using Matlab." In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2018. http://dx.doi.org/10.1109/rteict42901.2018.9012107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ximenes, Agostinho Marques, Sritrusta Sukaridhoto, Amang Sudarsono, Mochammad Rifki Ulil Albaab, Hasan Basri, Muhammad Aksa Hidayat Yani, Chew Chang Choon, and Ezharul Islam. "Implementation QR Code Biometric Authentication for Online Payment." In 2019 International Electronics Symposium (IES). IEEE, 2019. http://dx.doi.org/10.1109/elecsym.2019.8901575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stroica, Petre, and Marian Vladescu. "An overview on biometric identification methods and implementations." In Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies, edited by Paul Schiopu and George Caruntu. SPIE, 2010. http://dx.doi.org/10.1117/12.882520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Swati and Ramjee Prasad Gupta. "Implementation of Biometric Security in a Smartphone based Domotics." In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 2018. http://dx.doi.org/10.1109/icacccn.2018.8748672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography