Journal articles on the topic 'Biometry implementation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Biometry implementation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Full textWilhelm, Martin. "Project Management in Pharmaceutical Biometry and Data Management: Conception, Implementation, and Operations." Drug Information Journal 32, no. 1 (January 1998): 221–28. http://dx.doi.org/10.1177/009286159803200130.
Full textBonditti, Philippe. "From Territorial Space to Networks: A Foucaldian Approach to the Implementation of Biometry." Alternatives: Global, Local, Political 29, no. 4 (October 2004): 465–82. http://dx.doi.org/10.1177/030437540402900405.
Full textKurmanavicius, J., T. Burkhardt, D. Balsyte, L. Schäffer, and R. Zimmermann. "OP29.01: Implementation of the cumulative sum (CUSUM) technique for fetal ultrasound biometry quality control." Ultrasound in Obstetrics and Gynecology 36, S1 (October 2010): 136. http://dx.doi.org/10.1002/uog.8196.
Full textMeyer, JayJ, HansR Vellara, Riyaz Bhikoo, LucillaAh-Ching Sefo, Salome Lolokabaira, NeilL Murray, and CharlesN J. McGhee. "Improved refractive outcomes of small-incision extracapsular cataract surgery after implementation of a biometry training course." Middle East African Journal of Ophthalmology 26, no. 1 (2019): 17. http://dx.doi.org/10.4103/meajo.meajo_3_18.
Full textHryaschev, V., and Aleksey Nenashev. "Efficiency of the implementation of the peer-to-peer distributed system for securable information storage and processing (TheOOL Project)." Modeling of systems and processes 14, no. 3 (September 22, 2021): 82–89. http://dx.doi.org/10.12737/2219-0767-2021-14-3-82-89.
Full textWilliams, Mandy, Sue Turner, Emily Butler, and Jason Gardosi. "Fetal growth surveillance – Current guidelines, practices and challenges." Ultrasound 26, no. 2 (March 22, 2018): 69–79. http://dx.doi.org/10.1177/1742271x18760657.
Full textKAVADAS, S., D. DAMALAS, S. GEORGAKARAKOS, C. MARAVELIAS, G. TSERPES, C. PAPACONSTANTINOU, and G. BAZIGOS. "IMAS-Fish: Integrated MAnagement System to support the sustainability of Greek Fisheries resources. A multidisciplinary web-based database management system: implementation, capabilities, utilization and future prospects for fisheries stakeholde." Mediterranean Marine Science 14, no. 1 (March 4, 2013): 109. http://dx.doi.org/10.12681/mms.324.
Full textWysokinska, Zofia, and Radosław Dziuba. "Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland." Comparative Economic Research. Central and Eastern Europe 14, no. 4 (May 11, 2012): 117–50. http://dx.doi.org/10.2478/v10103-011-0030-2.
Full textHaux, R., and S. Koch. "Improving Bridging from Informatics Theory to Practice." Applied Clinical Informatics 06, no. 04 (2015): 748–56. http://dx.doi.org/10.4338/aci-2015-10-ra-0147.
Full textR., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textBudhe, Bhagyashri. "Implementation of Biometric Based Authentication System." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 377–83. http://dx.doi.org/10.22214/ijraset.2018.4067.
Full textHAMBALÍK, Alexander, and Pavol MARÁK. "DESIGN AND IMPLEMENTATION OF SOFTWARE SUPPORT FOR BIOMETRICS LABORATORY COURSES." Trends in Education 9, no. 1 (July 1, 2016): 75–83. http://dx.doi.org/10.5507/tvv.2016.010.
Full textAshiba, H. I., and F. E. Abd El-Samie. "Implementation face based cancelable multi-biometric system." Multimedia Tools and Applications 79, no. 41-42 (August 17, 2020): 30813–38. http://dx.doi.org/10.1007/s11042-020-09529-7.
Full textMalčík, Dominik, and Martin Drahanský. "Anatomy of Biometric Passports." Journal of Biomedicine and Biotechnology 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/490362.
Full textKot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people." Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.
Full textEl Beqqal, Mohamed, Mostafa Azizi, and Jean Louis Lanet. "A Novel Approach for an Interoperable Biometric Verification." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 124. http://dx.doi.org/10.3991/ijim.v12i6.9528.
Full textLee, Jong-Hak, Koo-Rack Park, Dong-Hyun Kim, and Joon-Yong Kim. "Implementation of Emergency Monitoring System using Biometric Data." Indian Journal of Public Health Research & Development 9, no. 3 (2018): 861. http://dx.doi.org/10.5958/0976-5506.2018.00396.0.
Full textSingh, Monika, and Sanjeev Kumar Sharma. "A Review on Implementation of Biometric Iris Recognition." International Journal of Computer Sciences and Engineering 6, no. 5 (May 31, 2018): 630–35. http://dx.doi.org/10.26438/ijcse/v6i5.630635.
Full textSoutar, Colin. "Implementation of Biometric Systems — Security and Privacy Considerations." Information Security Technical Report 7, no. 4 (December 2002): 49–55. http://dx.doi.org/10.1016/s1363-4127(02)00406-5.
Full textMir, G. M., A. A. Balkhi, N. A. Lala, N. A. Sofi, M. M. Kirmani, Itifaq A. Mir, and H. Arif Hamid. "The Benefits of Implementation of Biometric Attendance System." Oriental journal of computer science and technology 11, no. 1 (March 22, 2018): 50–54. http://dx.doi.org/10.13005/ojcst11.01.09.
Full textSharma, Shilpi, and J. S. Sodhi. "Implementation of Biometric Techniques in Social Networking Sites." International Journal of Security and Its Applications 8, no. 6 (November 30, 2014): 51–60. http://dx.doi.org/10.14257/ijsia.2014.8.6.05.
Full textPisarchik, Alexander, Ricardo Sevilla-Escoboza, Rider Jaimes-Reátegui, Guillermo Huerta-Cuellar, J. García-Lopez, and Victor Kazantsev. "Experimental Implementation of a Biometric Laser Synaptic Sensor." Sensors 13, no. 12 (December 16, 2013): 17322–31. http://dx.doi.org/10.3390/s131217322.
Full textShrivastava, Rajeev, Mohammad Javeed, and G. Mallesham. "Field Programmable Gate Array Implementation for Highly Secured Palm Print Authentication." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4565–70. http://dx.doi.org/10.1166/jctn.2020.9281.
Full textAlgarni, Abeer D., Ghada M. El Banby, Naglaa F. Soliman, Fathi E. Abd El-Samie, and Abdullah M. Iliyasu. "Efficient Implementation of Homomorphic and Fuzzy Transforms in Random-Projection Encryption Frameworks for Cancellable Face Recognition." Electronics 9, no. 6 (June 24, 2020): 1046. http://dx.doi.org/10.3390/electronics9061046.
Full textThilagavathi, B., and K. Suthendran. "Boosting Based Implementationof Biometric Authentication in IoT." Journal of Cyber Security and Mobility 7, no. 1 (2018): 131–44. http://dx.doi.org/10.13052/jcsm2245-1439.7110.
Full textPeer, P., Ž. Emeršič, J. Bule, J. Žganec-Gros, and V. Štruc. "Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/585139.
Full textMendyk-Krajewska, Teresa. "BIOMETRIC AUTHENTIC TECHNIQUES FOR THE IMPLEMENTATION OF E-SERVICES." Ekonomiczne Problemy Usług 131 (2018): 117–26. http://dx.doi.org/10.18276/epu.2018.131/2-11.
Full textS.Omran, Safaa, and Maryam Abdulmunem Salih. "Design and Implementation of Multi-model Biometric Identification System." International Journal of Computer Applications 99, no. 15 (August 20, 2014): 14–21. http://dx.doi.org/10.5120/17448-8255.
Full textBouafif, Lamia, and Noureddine Ellouze. "Implementation of a Biometric Interface in Voice Controlled Wheelchairs." Sound&Vibration 54, no. 1 (2020): 1–15. http://dx.doi.org/10.32604/sv.2020.08665.
Full textJin, Zhe, Andrew Beng Jin Teoh, Bok-Min Goi, and Yong-Haur Tay. "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation." Pattern Recognition 56 (August 2016): 50–62. http://dx.doi.org/10.1016/j.patcog.2016.02.024.
Full textElohor, Oyinloye Oghenerukevwe, Akinbohun Folake, Thompson Aderonke, and Korede Bashir. "Biometric, Fingervein, Machine L Implementation of a Security System, Using Captured Fingervein, Applying the Concepts of Machine Learning." International Journal of Engineering and Computer Science 9, no. 04 (April 14, 2020): 24994–5007. http://dx.doi.org/10.18535/ijecs/v9i04.4470.
Full textKumar, V. K. Narendira, and B. Srinivasan. "Implementation of Palm Print Biometric Identification System Using Ordinal Measures." International Journal of Information Technology and Computer Science 5, no. 12 (November 1, 2013): 86–96. http://dx.doi.org/10.5815/ijitcs.2013.12.11.
Full textMaheshwari, Saurabh, and Priyanka Choudhary. "Hidden Biometric Security Implementation through Human Brain's Artificial Macro Structure." Procedia Computer Science 78 (2016): 625–31. http://dx.doi.org/10.1016/j.procs.2016.02.109.
Full textBadmus, E. O., O. P. Odekunle, and D. O. Oyewobi. "Smart Fingerprint Biometric and RFID Time-Based Attendance Management System." European Journal of Electrical Engineering and Computer Science 5, no. 4 (July 27, 2021): 34–39. http://dx.doi.org/10.24018/ejece.2021.5.4.339.
Full textShamanina, E. I., and Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE." Vestnik Universiteta, no. 5 (July 16, 2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.
Full textAlvez, Carlos, Ernesto Miranda, Graciela Etchart, and Silvia Ruiz. "Efficient Iris Recognition Management in Object-Related Databases." Journal of Computer Science and Technology 18, no. 02 (October 4, 2018): e12. http://dx.doi.org/10.24215/16666038.18.e12.
Full textAlhayajneh, Abdullah, Alessandro Baccarini, Gary Weiss, Thaier Hayajneh, and Aydin Farajidavar. "Biometric Authentication and Verification for Medical Cyber Physical Systems." Electronics 7, no. 12 (December 14, 2018): 436. http://dx.doi.org/10.3390/electronics7120436.
Full textO., M., and David Sanka. "Implementation of Advance Encryption Standard (AES) in Biometric Electronic Voting Software." Communications on Applied Electronics 4, no. 3 (January 26, 2016): 30–42. http://dx.doi.org/10.5120/cae2016652052.
Full textLee, Hyung-Woo, and Yeong-Joon Park. "A Design and Implementation of User Authentication System using Biometric Information." Journal of the Korea Academia-Industrial cooperation Society 11, no. 9 (September 30, 2010): 3548–57. http://dx.doi.org/10.5762/kais.2010.11.9.3548.
Full textMohan, K., and S. Vamsee krishna. "FPGA Implementation of RF Technology and Biometric Authentication Based ATM Security." International Journal of Engineering Trends and Technology 15, no. 4 (September 25, 2014): 186–90. http://dx.doi.org/10.14445/22315381/ijett-v15p236.
Full textFairhurst, Michael, Meryem Erbilek, and Marjory Da Costa-Abreu. "Selective Review and Analysis of Aging Effects in Biometric System Implementation." IEEE Transactions on Human-Machine Systems 45, no. 3 (June 2015): 294–303. http://dx.doi.org/10.1109/thms.2014.2376874.
Full textNoah Akande, Oluwatobi, Oluwakemi Christiana Abikoye, Aderonke Anthonia Kayode, and Yema Lamari. "Implementation of a Framework for Healthy and Diabetic Retinopathy Retinal Image Recognition." Scientifica 2020 (May 19, 2020): 1–14. http://dx.doi.org/10.1155/2020/4972527.
Full textSabharwal, Munish. "Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 102–16. http://dx.doi.org/10.4018/ijbdcn.2017010109.
Full textLiu, Hailun, Dongmei Sun, Ke Xiong, and Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Full textBondavalli, Andrea, Ariadne Carvalho, Andrea Ceccarelli, and Enrico Schiavone. "Design, implementation, and assessment of a usable multi-biometric continuous authentication system." International Journal of Critical Computer-Based Systems 9, no. 3 (2019): 215. http://dx.doi.org/10.1504/ijccbs.2019.10026132.
Full textSchiavone, Enrico, Andrea Ceccarelli, Ariadne Carvalho, and Andrea Bondavalli. "Design, implementation, and assessment of a usable multi-biometric continuous authentication system." International Journal of Critical Computer-Based Systems 9, no. 3 (2019): 215. http://dx.doi.org/10.1504/ijccbs.2019.104490.
Full textMohana, Jaishankar, and Vijayan Thulasi Bai. "Implementation of Efficient Cryptographic Algorithm Based on Dynamic Biometric Key Generation Technique." Sensor Letters 14, no. 10 (October 1, 2016): 1044–48. http://dx.doi.org/10.1166/sl.2016.3581.
Full textLay, Yun-Long, Hui-Jen Yang, Chern-Sheng Lin, and Chung-Ho Tsai. "Implementation and Use of Feasibility Assessment of Biometric Locker System for Swimmers." Journal of Testing and Evaluation 41, no. 6 (August 30, 2013): 20120362. http://dx.doi.org/10.1520/jte20120362.
Full textHoo, Seng Chun, and Haidi Ibrahim. "Biometric-Based Attendance Tracking System for Education Sectors: A Literature Survey on Hardware Requirements." Journal of Sensors 2019 (September 15, 2019): 1–25. http://dx.doi.org/10.1155/2019/7410478.
Full text