To see the other types of publications on this topic, follow the link: Biometry implementation.

Journal articles on the topic 'Biometry implementation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometry implementation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
APA, Harvard, Vancouver, ISO, and other styles
2

Wilhelm, Martin. "Project Management in Pharmaceutical Biometry and Data Management: Conception, Implementation, and Operations." Drug Information Journal 32, no. 1 (January 1998): 221–28. http://dx.doi.org/10.1177/009286159803200130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonditti, Philippe. "From Territorial Space to Networks: A Foucaldian Approach to the Implementation of Biometry." Alternatives: Global, Local, Political 29, no. 4 (October 2004): 465–82. http://dx.doi.org/10.1177/030437540402900405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kurmanavicius, J., T. Burkhardt, D. Balsyte, L. Schäffer, and R. Zimmermann. "OP29.01: Implementation of the cumulative sum (CUSUM) technique for fetal ultrasound biometry quality control." Ultrasound in Obstetrics and Gynecology 36, S1 (October 2010): 136. http://dx.doi.org/10.1002/uog.8196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meyer, JayJ, HansR Vellara, Riyaz Bhikoo, LucillaAh-Ching Sefo, Salome Lolokabaira, NeilL Murray, and CharlesN J. McGhee. "Improved refractive outcomes of small-incision extracapsular cataract surgery after implementation of a biometry training course." Middle East African Journal of Ophthalmology 26, no. 1 (2019): 17. http://dx.doi.org/10.4103/meajo.meajo_3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hryaschev, V., and Aleksey Nenashev. "Efficiency of the implementation of the peer-to-peer distributed system for securable information storage and processing (TheOOL Project)." Modeling of systems and processes 14, no. 3 (September 22, 2021): 82–89. http://dx.doi.org/10.12737/2219-0767-2021-14-3-82-89.

Full text
Abstract:
methodology of evaluation of efficiency of the implementation at industrial enterprises of “peer-to-peer distributed systems of storage and processing of protected information in enterprise networks” has been proposed. The efficiency evaluation is based on the comparison of the indicators of reliability, fault tolerance, and total cost of ownership of the implementation of corporate information systems within the proposed system and its possible alternatives. The “peer-to-peer distributed system of storage and processing of protected information” is designed for the protection of distributed computing and incapsulation of private networks without restricting possibilities for usable interactions in the process of implementation of Industry 5.0 and Super Smart Society technologies. When these concepts get implemented in an enterprise, manufacture, logistics, and sales are merged into a global geographically and organizationally distributed information system for data exchange, which functions on top of the Internet. The proposed system offers tools for setting up distributed computing, and it ensures an effective response to threats by applying cryptography, unauthorized access protection with the use of biometry and an innovative protocol for information exchange and control of topology powered by distributed ledger technology, while also optimizing the utilization of computing capacity.
APA, Harvard, Vancouver, ISO, and other styles
7

Williams, Mandy, Sue Turner, Emily Butler, and Jason Gardosi. "Fetal growth surveillance – Current guidelines, practices and challenges." Ultrasound 26, no. 2 (March 22, 2018): 69–79. http://dx.doi.org/10.1177/1742271x18760657.

Full text
Abstract:
Antenatal surveillance of fetal growth is an essential part of good maternity care, as lack of detection of fetal growth restriction is directly associated with stillbirth and perinatal morbidity. New algorithms and guidelines provide care pathways which rely on regular third trimester ultrasound biometry and plotting of estimated fetal weight in pregnancies considered to be at increased risk, and their implementation has increased pressures on ultrasound resources. Customised growth charts have improved the distinction between constitutional and pathological smallness and reduced unnecessary referrals. Their introduction, together with clinicians' training, e-learning and audit as the key elements of the growth assessment protocol, has resulted in increased antenatal detection of small for gestational age babies and a reduction in avoidable stillbirths. However, missed case audits highlight that further improvements are needed, and point to the need to address quality assurance and resource issues in ultrasound services.
APA, Harvard, Vancouver, ISO, and other styles
8

KAVADAS, S., D. DAMALAS, S. GEORGAKARAKOS, C. MARAVELIAS, G. TSERPES, C. PAPACONSTANTINOU, and G. BAZIGOS. "IMAS-Fish: Integrated MAnagement System to support the sustainability of Greek Fisheries resources. A multidisciplinary web-based database management system: implementation, capabilities, utilization and future prospects for fisheries stakeholde." Mediterranean Marine Science 14, no. 1 (March 4, 2013): 109. http://dx.doi.org/10.12681/mms.324.

Full text
Abstract:
This article describes in detail the “IMAS-Fish” web-based tool implementation technicalities and provides examples on how can it be used for scientific and management purposes setting new standards in fishery science. “IMAS-Fish” was developed to support the assessment of marine biological resources by: (i) homogenizing all the available datasets under a relational database, (ii) facilitating quality control and data entry, (iii) offering easy access to raw data, (iv) providing processed results through a series of classical and advanced fishery statistics algorithms, and (v) visualizing the results on maps using GIS technology. Available datasets cover among others: Fishery independent experimental surveys data (locations, species, catch compositions, biological data); Commercial fishing activities (fishing gear, locations, catch compositions, discards); Market sampling data (species, biometry, maturity, ageing); Satellite derived ocean data (Sea surface temperature, Salinity, Wind speed, Chlorophyll-a concentrations, Photosynthetically active radiation); Oceanographic parameters (CTD measurements); Official national fishery statistics; Fishing fleet registry and VMS data; Fishing ports inventory; Fishing legislation archive (national and EU); Bathymetry grids. Currently, the homogenized database holds a total of more than 100,000,000 records. The web-based application is accessible through an internet browser and can serve as a valuable tool for all involved stakeholders: fisheries scientists, state officials responsible for management, fishermen cooperatives, academics, students and NGOs.
APA, Harvard, Vancouver, ISO, and other styles
9

Wysokinska, Zofia, and Radosław Dziuba. "Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland." Comparative Economic Research. Central and Eastern Europe 14, no. 4 (May 11, 2012): 117–50. http://dx.doi.org/10.2478/v10103-011-0030-2.

Full text
Abstract:
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.
APA, Harvard, Vancouver, ISO, and other styles
10

Haux, R., and S. Koch. "Improving Bridging from Informatics Theory to Practice." Applied Clinical Informatics 06, no. 04 (2015): 748–56. http://dx.doi.org/10.4338/aci-2015-10-ra-0147.

Full text
Abstract:
SummaryBackground: In 1962, Methods of Information in Medicine (MIM) began to publish papers on the methodology and scientific fundamentals of managing data, information, and knowledge in biomedicine and health care. Meeting an increasing demand for research about practical implementation of health information systems, the journal Applied Clinical Informatics (ACI) was launched in 2009. Both journals are official journals of the International Medical Informatics Association (IMIA).Objectives: Based on prior analyses, we aimed to describe major topics published in MIM during 2014 and to explore whether theory of MIM influenced practice of ACI. Our objectives were further to describe lessons learned and to discuss possible editorial policies to improve bridging from theory to practice.Methods: We conducted a retrospective, observational study reviewing MIM articles published during 2014 (N=61) and analyzing reference lists of ACI articles from 2014 (N=70). Lessons learned and opinions about MIM editorial policies were developed in consensus by the two authors. These have been influenced by discussions with the journal’s associate editors and editorial board members.Results: The publication topics of MIM in 2014 were broad, covering biomedical and health informatics, medical biometry and epidemiology. Important topics discussed were biosignal interpretation, boosting methodologies, citation analysis, health-enabling and ambient assistive technologies, health record banking, safety, and standards. Nine ACI practice articles from 2014 cited eighteen MIM theory papers from any year. These nine ACI articles covered mainly the areas of clinical documentation and medication-related decision support. The methodological basis they cited from was almost exclusively related to evaluation. We could show some direct links where theory impacted practice. These links are however few in relation to the total amount of papers published.Conclusions: Editorial policies such as publishing systematic methodological reviews and clarification of possible practical impact of theory-focused articles may improve bridging.
APA, Harvard, Vancouver, ISO, and other styles
11

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
12

Budhe, Bhagyashri. "Implementation of Biometric Based Authentication System." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 377–83. http://dx.doi.org/10.22214/ijraset.2018.4067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

HAMBALÍK, Alexander, and Pavol MARÁK. "DESIGN AND IMPLEMENTATION OF SOFTWARE SUPPORT FOR BIOMETRICS LABORATORY COURSES." Trends in Education 9, no. 1 (July 1, 2016): 75–83. http://dx.doi.org/10.5507/tvv.2016.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ashiba, H. I., and F. E. Abd El-Samie. "Implementation face based cancelable multi-biometric system." Multimedia Tools and Applications 79, no. 41-42 (August 17, 2020): 30813–38. http://dx.doi.org/10.1007/s11042-020-09529-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Malčík, Dominik, and Martin Drahanský. "Anatomy of Biometric Passports." Journal of Biomedicine and Biotechnology 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/490362.

Full text
Abstract:
Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted).
APA, Harvard, Vancouver, ISO, and other styles
16

Kot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people." Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.

Full text
Abstract:
Forensic biometric databases are an out of court tool to support the work of law enforcement agencies. They are used to detect the perpetrators of crimes, indicate the connections of a person with previously committed crimes, and allow the identification of living persons and corpses with unknown identity or individuals trying to hide their identity. In police practice, among the methods of identification of living persons and corpses, fingerprint and DNA tests are mainly used. These two forensic areas are supported by such tools such as AFIS (Automatic Fingerprint Identification System) and CODIS (Combined DNA Index System). These are the main police systems operating within two datasets, namely the dactyloscopic dataset and the DNA dataset. The systems are operating in two different locations of the Central Forensic Laboratory of the Police (CFLP). This results in the processing of individual biometric data independently of each other at different times and locations (Fingerprint Examination Department and Biology Department). Currently, there is no comprehensive approach to the collection and processing of biometric data such as fingerprints, DNA or facial images. To improve the exchange of information between police authorities, in July 2019, the Central Forensic Laboratory of the Police submitted a project application, and on 25 November 2019 signed with the National Center for Research and Development the grant agreement no. DOB – BIO10/09/01/2019 for the implementation and financing of the project in the area of state defense and security (competition no. 10/2019) entitled “Development of a technologically advanced information system enabling automated processing of information collected in forensic biometric databases for the purpose of combating crime or identifying people – acronym “BIOMETRIA”.
APA, Harvard, Vancouver, ISO, and other styles
17

El Beqqal, Mohamed, Mostafa Azizi, and Jean Louis Lanet. "A Novel Approach for an Interoperable Biometric Verification." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 124. http://dx.doi.org/10.3991/ijim.v12i6.9528.

Full text
Abstract:
<span style="font-family: 'Times New Roman','serif'; font-size: 9pt; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">Increasingly, safety is present in everyday life, at work, at home, in recreational environments, and in all places where there is a flow of people who share a common space. Using biometric fingerprint technique for identity verification has become a primordial due to the Reduced costs of implementation, maturity of this technology in the market and the ease of use. Many implementations exist using this technique , however, these systems are hard coupled with the environment in which they were developed and the hardware used to capture biometric data. Consequently, the interoperability issue is hard present in case of changing the environment or using new fingerprint reader. In this paper, we propose a new architecture to solve this problem by dividing the main biometric application to layers based on a flexible communication between components and supporting heterogeneous platforms and biometric readers.</span>
APA, Harvard, Vancouver, ISO, and other styles
18

Lee, Jong-Hak, Koo-Rack Park, Dong-Hyun Kim, and Joon-Yong Kim. "Implementation of Emergency Monitoring System using Biometric Data." Indian Journal of Public Health Research & Development 9, no. 3 (2018): 861. http://dx.doi.org/10.5958/0976-5506.2018.00396.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Singh, Monika, and Sanjeev Kumar Sharma. "A Review on Implementation of Biometric Iris Recognition." International Journal of Computer Sciences and Engineering 6, no. 5 (May 31, 2018): 630–35. http://dx.doi.org/10.26438/ijcse/v6i5.630635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Soutar, Colin. "Implementation of Biometric Systems — Security and Privacy Considerations." Information Security Technical Report 7, no. 4 (December 2002): 49–55. http://dx.doi.org/10.1016/s1363-4127(02)00406-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mir, G. M., A. A. Balkhi, N. A. Lala, N. A. Sofi, M. M. Kirmani, Itifaq A. Mir, and H. Arif Hamid. "The Benefits of Implementation of Biometric Attendance System." Oriental journal of computer science and technology 11, no. 1 (March 22, 2018): 50–54. http://dx.doi.org/10.13005/ojcst11.01.09.

Full text
Abstract:
Bio metric technology is now used for employees time management attendance system because it has ability to recognize peoples unique physiological characteristics. Because of multiple benefits of Bio metric attendance system it has gained high popularity in the market. Bio metrics attendance system is extremely useful in helping business community feel secure by eliminating employees time theft, as it relies on ones personal characteristics that vary between individuals. Since bio metrics characteristics cannot be duplicate, it prevents punching on behalf of a co-worker working in the same company. The manual practice of attendance system is time consuming and needs full time personal monitoring whereas bio metric attendance saves employee time, decreases staffing overhead and provides accurate labor data to payroll system to effectively manage business operations and thereby increase productivity. Moreover the bio metric attendance system has brought transparency and enhanced the work culture in the system. We will explore various advantages and disadvantages of implementation of the bio metric attendance system to a big organization, or small entrepreneur or unit and the necessary measures for its efficient implementation.
APA, Harvard, Vancouver, ISO, and other styles
22

Sharma, Shilpi, and J. S. Sodhi. "Implementation of Biometric Techniques in Social Networking Sites." International Journal of Security and Its Applications 8, no. 6 (November 30, 2014): 51–60. http://dx.doi.org/10.14257/ijsia.2014.8.6.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Pisarchik, Alexander, Ricardo Sevilla-Escoboza, Rider Jaimes-Reátegui, Guillermo Huerta-Cuellar, J. García-Lopez, and Victor Kazantsev. "Experimental Implementation of a Biometric Laser Synaptic Sensor." Sensors 13, no. 12 (December 16, 2013): 17322–31. http://dx.doi.org/10.3390/s131217322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Shrivastava, Rajeev, Mohammad Javeed, and G. Mallesham. "Field Programmable Gate Array Implementation for Highly Secured Palm Print Authentication." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4565–70. http://dx.doi.org/10.1166/jctn.2020.9281.

Full text
Abstract:
To guarantee individual ID and profoundly secure recognizable proof issues, biometric innovations will give more prominent security while improving precision. This new innovation has been done lately because of exchange misrepresentation, security breaks, individual ID, and so on. The excellence of biometric innovation is that it gives an exceptional code to every individual and can’t be duplicated or manufactured by others. So as to conquer the withdrawal of finger impression frameworks, this paper proposed a palm-based individual distinguishing proof framework, a promising and new research region in biometric recognizable proof frameworks in light of their uniqueness, adaptability and a quicker and wide scope of high speeds. It gives higher security on biometric unique mark frameworks with rich highlights, for example, wrinkles, constant brushes, mainlines, details focuses and single focuses. The fundamental motivation behind the proposed palm unique finger impression framework is to actualize a framework with higher exactness and speed up palm unique finger impression acknowledgment for some clients. Here, in this we presented an exceptionally ensured palm print recognizable proof framework with intrigue extraction territory (ROI) with a morphological procedure utilizing a two-way un-crushed or course vector (UDBW) change to separate low-level palm fingerprints enrolled capacities for its vector work (FV) and afterward after correlation is by estimating the separation between the palm transporters and the capacity of the palm and the capacity of the enlisted transport line and palm control. The after effects of the recreation show that the proposed biometric recognizable proof framework gives more noteworthy precision and solid distinguishing proof speed.
APA, Harvard, Vancouver, ISO, and other styles
25

Algarni, Abeer D., Ghada M. El Banby, Naglaa F. Soliman, Fathi E. Abd El-Samie, and Abdullah M. Iliyasu. "Efficient Implementation of Homomorphic and Fuzzy Transforms in Random-Projection Encryption Frameworks for Cancellable Face Recognition." Electronics 9, no. 6 (June 24, 2020): 1046. http://dx.doi.org/10.3390/electronics9061046.

Full text
Abstract:
To circumvent problems associated with dependence on traditional security systems on passwords, Personal Identification Numbers (PINs) and tokens, modern security systems adopt biometric traits that are inimitable to each individual for identification and verification. This study presents two different frameworks for secure person identification using cancellable face recognition (CFR) schemes. Exploiting its ability to guarantee irrevocability and rich diversity, both frameworks utilise Random Projection (RP) to encrypt the biometric traits. In the first framework, a hybrid structure combining Intuitionistic Fuzzy Logic (IFL) with RP is used to accomplish full distortion and encryption of the original biometric traits to be saved in the database, which helps to prevent unauthorised access of the biometric data. The framework involves transformation of spatial-domain greyscale pixel information to a fuzzy domain where the original biometric images are disfigured and further distorted via random projections that generate the final cancellable traits. In the second framework, cancellable biometric traits are similarly generated via homomorphic transforms that use random projections to encrypt the reflectance components of the biometric traits. Here, the use of reflectance properties is motivated by its ability to retain most image details, while the guarantee of the non-invertibility of the cancellable biometric traits supports the rationale behind our utilisation of another RP stage in both frameworks, since independent outcomes of both the IFL stage and the reflectance component of the homomorphic transform are not enough to recover the original biometric trait. Our CFR schemes are validated on different datasets that exhibit properties expected in actual application settings such as varying backgrounds, lightings, and motion. Outcomes in terms standard metrics, including structural similarity index metric (SSIM) and area under the receiver operating characteristic curve (AROC), suggest the efficacy of our proposed schemes across many applications that require person identification and verification.
APA, Harvard, Vancouver, ISO, and other styles
26

Thilagavathi, B., and K. Suthendran. "Boosting Based Implementationof Biometric Authentication in IoT." Journal of Cyber Security and Mobility 7, no. 1 (2018): 131–44. http://dx.doi.org/10.13052/jcsm2245-1439.7110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Peer, P., Ž. Emeršič, J. Bule, J. Žganec-Gros, and V. Štruc. "Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/585139.

Full text
Abstract:
Cloud computing represents one of the fastest growing areas of technology and offers a new computing model for various applications and services. This model is particularly interesting for the area of biometric recognition, where scalability, processing power, and storage requirements are becoming a bigger and bigger issue with each new generation of recognition technology. Next to the availability of computing resources, another important aspect of cloud computing with respect to biometrics is accessibility. Since biometric cloud services are easily accessible, it is possible to combine different existing implementations and design new multibiometric services that next to almost unlimited resources also offer superior recognition performance and, consequently, ensure improved security to its client applications. Unfortunately, the literature on the best strategies of how to combine existing implementations of cloud-based biometric experts into a multibiometric service is virtually nonexistent. In this paper, we try to close this gap and evaluate different strategies for combining existing biometric experts into a multibiometric cloud service. We analyze the (fusion) strategies from different perspectives such as performance gains, training complexity, or resource consumption and present results and findings important to software developers and other researchers working in the areas of biometrics and cloud computing. The analysis is conducted based on two biometric cloud services, which are also presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
28

Mendyk-Krajewska, Teresa. "BIOMETRIC AUTHENTIC TECHNIQUES FOR THE IMPLEMENTATION OF E-SERVICES." Ekonomiczne Problemy Usług 131 (2018): 117–26. http://dx.doi.org/10.18276/epu.2018.131/2-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

S.Omran, Safaa, and Maryam Abdulmunem Salih. "Design and Implementation of Multi-model Biometric Identification System." International Journal of Computer Applications 99, no. 15 (August 20, 2014): 14–21. http://dx.doi.org/10.5120/17448-8255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bouafif, Lamia, and Noureddine Ellouze. "Implementation of a Biometric Interface in Voice Controlled Wheelchairs." Sound&Vibration 54, no. 1 (2020): 1–15. http://dx.doi.org/10.32604/sv.2020.08665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jin, Zhe, Andrew Beng Jin Teoh, Bok-Min Goi, and Yong-Haur Tay. "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation." Pattern Recognition 56 (August 2016): 50–62. http://dx.doi.org/10.1016/j.patcog.2016.02.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Elohor, Oyinloye Oghenerukevwe, Akinbohun Folake, Thompson Aderonke, and Korede Bashir. "Biometric, Fingervein, Machine L Implementation of a Security System, Using Captured Fingervein, Applying the Concepts of Machine Learning." International Journal of Engineering and Computer Science 9, no. 04 (April 14, 2020): 24994–5007. http://dx.doi.org/10.18535/ijecs/v9i04.4470.

Full text
Abstract:
This work explores the field of biometric finger vein recognition – which is the identification of individuals using the unique vein patterns under their finger skins. This work also includes the implementation of an Android fingerprint biometric system using the Android Near InfraRed (NIR) module, which exists to show the similarities and differences between the two (fingervein and fingerprint) prevalent biometric features. This work thus confirms that finger vein recognition shows great promise as an accurate solution to modern society’s problem of automated personal authentication
APA, Harvard, Vancouver, ISO, and other styles
33

Kumar, V. K. Narendira, and B. Srinivasan. "Implementation of Palm Print Biometric Identification System Using Ordinal Measures." International Journal of Information Technology and Computer Science 5, no. 12 (November 1, 2013): 86–96. http://dx.doi.org/10.5815/ijitcs.2013.12.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Maheshwari, Saurabh, and Priyanka Choudhary. "Hidden Biometric Security Implementation through Human Brain's Artificial Macro Structure." Procedia Computer Science 78 (2016): 625–31. http://dx.doi.org/10.1016/j.procs.2016.02.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Badmus, E. O., O. P. Odekunle, and D. O. Oyewobi. "Smart Fingerprint Biometric and RFID Time-Based Attendance Management System." European Journal of Electrical Engineering and Computer Science 5, no. 4 (July 27, 2021): 34–39. http://dx.doi.org/10.24018/ejece.2021.5.4.339.

Full text
Abstract:
Attendance documentation is a crucial metric for determining a student's dedication, qualification, and status. Several types of systems have been developed for automated attendance. The majority of these implementations were built on a single factor template, representing a line of security error. In recent years, rapid development has taken place in several applications such as authorization, data access, and access control by implementing biometrics and radio frequency identification technologies. This research work focuses on designing a smart protocol for RFID authentication in combination with fingerprint biometric information, which guarantees confidentiality, identity verification, and data protection. Reaction time and event performance evaluation were the tests performed on the system. Ten students with unique fingerprints and RFID cards are assessed for the test. The test results show an average duration of 20.61 respective seconds for each student, and zero percent of false refusal rate was recorded in the implementation. Finally, the result shows the system is reliable and efficient. Each result revealed high-speed performance due to software and hardware coordination. Biometric systems provided data integrity and security, RFID provided limited complexity, and the proposed method's technical programming pattern provided an average run time.
APA, Harvard, Vancouver, ISO, and other styles
36

Shamanina, E. I., and Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE." Vestnik Universiteta, no. 5 (July 16, 2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.

Full text
Abstract:
The issues related to the developing and improving remote identification mechanism in the Russian banking sector have been considered. The main aspects of the process of collecting, processing, checking and storing biometric data, the functioning status of Single Biometric System (SBS) have been highlighted. The vulnerability and risks of using biometric technologies by banks have been noted. The key trends in the development of the international market of biometric technologies and their application in the banking sector have been presented, as well as current events on the implementation of biometric technologies in Russia. The prospects for the use of biometric technologies in the banking sector and directions for improving the technological infrastructure in order to protect data from unauthorized access have been outlined.
APA, Harvard, Vancouver, ISO, and other styles
37

Alvez, Carlos, Ernesto Miranda, Graciela Etchart, and Silvia Ruiz. "Efficient Iris Recognition Management in Object-Related Databases." Journal of Computer Science and Technology 18, no. 02 (October 4, 2018): e12. http://dx.doi.org/10.24215/16666038.18.e12.

Full text
Abstract:
Biometric applications have grown significantly in recent years, particularly iris-based systems. In the present work, an extension of an Object Relational Database Management System for the integral management of a biometric system based on the human iris was presented. Although at present, there are many database extensions for different domains, in no case for biometric applications. The proposed extension includes both the extension of the type system and the definition of domain indexes for performance improvement. The aim of this work is to provide a tool that facilitates the development of biometric applications based on the iris feature. Its development is based on a reference architecture that includes both the management of images of the iris trait, its associated metadata and the necessary methods for both manipulation and queries. An implementation of the extension is performed for PostgreSQL DBMS, and SP-GiST framework is used in the implementation of a domain index. Experiments were carried out to evaluate the performance of the proposed index, which shows improvements in query execution times.
APA, Harvard, Vancouver, ISO, and other styles
38

Alhayajneh, Abdullah, Alessandro Baccarini, Gary Weiss, Thaier Hayajneh, and Aydin Farajidavar. "Biometric Authentication and Verification for Medical Cyber Physical Systems." Electronics 7, no. 12 (December 14, 2018): 436. http://dx.doi.org/10.3390/electronics7120436.

Full text
Abstract:
A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS). Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication. Extensive research has been conducted regarding the various methodologies (e.g., ECG, EEG, gait, head/arm motion, skin impedance). This paper seeks to analyze and evaluate the most prominent biometric authentication techniques based on accuracy, cost, and feasibility of implementation. We suggest several authentication schemes which incorporate multiple biometric properties.
APA, Harvard, Vancouver, ISO, and other styles
39

O., M., and David Sanka. "Implementation of Advance Encryption Standard (AES) in Biometric Electronic Voting Software." Communications on Applied Electronics 4, no. 3 (January 26, 2016): 30–42. http://dx.doi.org/10.5120/cae2016652052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Hyung-Woo, and Yeong-Joon Park. "A Design and Implementation of User Authentication System using Biometric Information." Journal of the Korea Academia-Industrial cooperation Society 11, no. 9 (September 30, 2010): 3548–57. http://dx.doi.org/10.5762/kais.2010.11.9.3548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mohan, K., and S. Vamsee krishna. "FPGA Implementation of RF Technology and Biometric Authentication Based ATM Security." International Journal of Engineering Trends and Technology 15, no. 4 (September 25, 2014): 186–90. http://dx.doi.org/10.14445/22315381/ijett-v15p236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Fairhurst, Michael, Meryem Erbilek, and Marjory Da Costa-Abreu. "Selective Review and Analysis of Aging Effects in Biometric System Implementation." IEEE Transactions on Human-Machine Systems 45, no. 3 (June 2015): 294–303. http://dx.doi.org/10.1109/thms.2014.2376874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Noah Akande, Oluwatobi, Oluwakemi Christiana Abikoye, Aderonke Anthonia Kayode, and Yema Lamari. "Implementation of a Framework for Healthy and Diabetic Retinopathy Retinal Image Recognition." Scientifica 2020 (May 19, 2020): 1–14. http://dx.doi.org/10.1155/2020/4972527.

Full text
Abstract:
The feature extraction stage remains a major component of every biometric recognition system. In most instances, the eventual accuracy of a recognition system is dependent on the features extracted from the biometric trait and the feature extraction technique adopted. The widely adopted technique employs features extracted from healthy retinal images in training retina recognition system. However, literature has shown that certain eye diseases such as diabetic retinopathy (DR), hypertensive retinopathy, glaucoma, and cataract could alter the recognition accuracy of the retina recognition system. This connotes that a robust retina recognition system should be designed to accommodate healthy and diseased retinal images. A framework with two different approaches for retina image recognition is presented in this study. The first approach employed structural features for healthy retinal image recognition while the second employed vascular and lesion-based features for DR retinal image recognition. Any input retinal image was first examined for the presence of DR symptoms before the appropriate feature extraction technique was adopted. Recognition rates of 100% and 97.23% were achieved for the healthy and DR retinal images, respectively, and a false acceptance rate of 0.0444 and a false rejection rate of 0.0133 were also achieved.
APA, Harvard, Vancouver, ISO, and other styles
44

Sabharwal, Munish. "Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 102–16. http://dx.doi.org/10.4018/ijbdcn.2017010109.

Full text
Abstract:
The rationale of the research work is to suggest a multi-modal biometric authentication and secure transaction operation framework for E-Banking. The literature survey identifies the various types of E-Banking Channels available as on-date, the various types of biometric technologies available as on-date as well the significant metrics affecting their performance while deploying them in various different e-banking channels. The performance analysis of various types of biometric technologies based on significant metrics for Biometrics Implementation further identifies the currently implementable biometric technologies for the various different e-banking channels. Subsequently a requirement analysis of potential e-banking channels is followed by System Suitability Analysis to identify which multi-biometrics and support mechanisms are suitable for particular e-banking channels. The final conclusion suggests a viable multi-modal biometric authentication and secure transaction operation framework for various e-banking channels.
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Hailun, Dongmei Sun, Ke Xiong, and Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.

Full text
Abstract:
Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security.
APA, Harvard, Vancouver, ISO, and other styles
46

Bondavalli, Andrea, Ariadne Carvalho, Andrea Ceccarelli, and Enrico Schiavone. "Design, implementation, and assessment of a usable multi-biometric continuous authentication system." International Journal of Critical Computer-Based Systems 9, no. 3 (2019): 215. http://dx.doi.org/10.1504/ijccbs.2019.10026132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Schiavone, Enrico, Andrea Ceccarelli, Ariadne Carvalho, and Andrea Bondavalli. "Design, implementation, and assessment of a usable multi-biometric continuous authentication system." International Journal of Critical Computer-Based Systems 9, no. 3 (2019): 215. http://dx.doi.org/10.1504/ijccbs.2019.104490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mohana, Jaishankar, and Vijayan Thulasi Bai. "Implementation of Efficient Cryptographic Algorithm Based on Dynamic Biometric Key Generation Technique." Sensor Letters 14, no. 10 (October 1, 2016): 1044–48. http://dx.doi.org/10.1166/sl.2016.3581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lay, Yun-Long, Hui-Jen Yang, Chern-Sheng Lin, and Chung-Ho Tsai. "Implementation and Use of Feasibility Assessment of Biometric Locker System for Swimmers." Journal of Testing and Evaluation 41, no. 6 (August 30, 2013): 20120362. http://dx.doi.org/10.1520/jte20120362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hoo, Seng Chun, and Haidi Ibrahim. "Biometric-Based Attendance Tracking System for Education Sectors: A Literature Survey on Hardware Requirements." Journal of Sensors 2019 (September 15, 2019): 1–25. http://dx.doi.org/10.1155/2019/7410478.

Full text
Abstract:
The application of biometric recognition in personal authentication enables the growth of this technology to be employed in various domains. The implementation of biometric recognition systems can be based on physical or behavioral characteristics, such as the iris, voice, fingerprint, and face. Currently, the attendance tracking system based on biometric recognition for education sectors is still underutilized, thus providing a good opportunity to carry out interesting research in this area. As evidenced in a typical classroom, educators tend to take the attendance of their students by using conventional methods such as by calling out names or signing off an attendance sheet. Yet, these types of methods are proved to be time consuming and tedious, and sometimes, fraud occurs. As a result, significant progress had been made to mark attendance automatically by making use of biometric recognition. This progress enables a new and more advanced biometric-based attendance system being developed over the past ten years. The setting-up of biometric-based attendance systems requires both software and hardware components. Since the software and hardware sections are too broad to be discussed in one paper, this literature survey only provides an overview of the types of hardware used. Emphasis is then placed on the microcontroller platform, biometric sensor, communication channel, database storage, and other components in order to assist future researchers in designing the hardware part of biometric-based attendance systems.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography