-
261
Sleep and cardiorespiratory function assessed by a smart bed over 10 weeks post COVID-19 infection
Published 2025-01-01“…We used smart beds to record biometric data following COVID-19 infection in nonhospitalized patients. …”
Get full text
Article -
262
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01“…By combining fuzzy extractors with biometric features and user passwords, two-factor authentication, password and biometric feature update functions were implemented. …”
Get full text
Article -
263
Feature-Level vs. Score-Level Fusion in the Human Identification System
Published 2021-01-01“…The design of a robust human identification system is in high demand in most modern applications such as internet banking and security, where the multifeature biometric system, also called feature fusion biometric system, is one of the common solutions that increases the system reliability and improves recognition accuracy. …”
Get full text
Article -
264
Rancang Bangun Alat Pengenal Finger Vein Menggunakan Raspberry Pi dengan Metode Convolutional Neural Network (CNN)
Published 2024-10-01“…A biometric recognition system has advantages and certainly some limitations in terms of performance and convenience. …”
Get full text
Article -
265
Evaluation of the Repeatability and the Reproducibility of AL-Scan Measurements Obtained by Residents
Published 2014-01-01“…The AL-Scan device exhibits good repeatability and reproducibility in all biometric measurements and IOL power calculations, independent of the operator concerned.…”
Get full text
Article -
266
Organoleptic properties and neuroimaging response on the perception of edible gels
Published 2025-01-01“…This highlights the need to use biometric and neuroimaging methods in food research in order to create more optimal formulations for specific populations.…”
Get full text
Article -
267
Predictors of Endothelial Cell Loss after Phacoemulsification for the Treatment of Primary Angle Closure
Published 2019-01-01“…The change in ECD and its relation to clinical characteristics and biometric parameters were evaluated by linear regression analysis. …”
Get full text
Article -
268
Fingerprint abnormalities in systemic sclerosis: Results of a single center pilot study
Published 2018-01-01“…Documentation of this abnormality should allow the use of other biometric tools for personal identification.…”
Get full text
Article -
269
Sparse Matrix for ECG Identification with Two-Lead Features
Published 2015-01-01“…Electrocardiograph (ECG) human identification has the potential to improve biometric security. However, improvements in ECG identification and feature extraction are required. …”
Get full text
Article -
270
Design and Development of Polymer-Based Optical Fiber Sensor for GAIT Analysis
Published 2023-01-01“…In the present scenario like COVID-19 pandemic, to maintain physical distance, the gait-based biometric is a must. Human gait identification is a very difficult process, but it is a suitable distance biometric that also gives good results at low resolution conditions even with face features that are not clear. …”
Get full text
Article -
271
Evaluation of Spatial Spillover Effect of Multidimensional Hybrid Financial Risk Contagion Based on the DAI Spatial Econometric Model
Published 2023-01-01“…Multimedia modeling in Health Cloud biometric authentication and data management systems can be applied to the analysis of financial markets. …”
Get full text
Article -
272
The effect of acorn scarification on the growth and root system size of Quercus robur L. seedlings grown in nursery containers
Published 2025-01-01“…The obtained results confirmed the positive effect of seed scarification on germination and emergence efficiency, as well as on biometric features and the quality of the grown seedlings.…”
Get full text
Article -
273
Iris Recognition Using Image Moments and k-Means Algorithm
Published 2014-01-01“…This paper presents a biometric technique for identification of a person using the iris image. …”
Get full text
Article -
274
Exploring fetal growth patterns in the second trimester: insights from ultrasound measurements among the Minangkabau Ethnic Group in Indonesia
Published 2025-01-01“…Results Demographically, most participants were 21–30 years old, primigravida, with senior high school education, and employed. Fetal biometric measurements displayed increasing variability with gestational age. …”
Get full text
Article -
275
Survey of security for Android smart terminal
Published 2016-06-01“…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
Get full text
Article -
276
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01“…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
Get full text
Article -
277
The efficacy of chelated micronutrient fertilisers in tomato cultivation
Published 2024-12-01“…It was observed that plants subjected to foliar fertilisation had superior biometric indicators during the mass flowering phase. …”
Get full text
Article -
278
QR code security management system based on WPKI and iris recognition
Published 2018-05-01“…Aiming at the deficiency of existing QR code security technology,a security management system based on WPKI and iris recognition was designed and implemented.The system uses digital certificates to sign the hashed information for the user to verify the source of the QR code based on WPKI technology.Through the public security household registration management system,WPKI/CA system,server and mobile client four subsystems to standardize the management of the production and identification of QR code,and the application for the certificate of the user real name certification combined with biometric identification technology,indirectly realizing the binding of digital certificates and user physical identities to form a set of accountability mechanisms.Test results show that the system can meet accuracy and robustness requirements.…”
Get full text
Article -
279
Reproductive biology of catfish, Pachypterus atherinoides (Bloch, 1794) with Special Reference to lentic and lotic ecosystem
Published 2024-08-01“…This study would help aquaculturists in the culture, captive breeding, and conservation of P. atherinoides and also help researchers in the biometric study of another fish.…”
Get full text
Article -
280
Attention-enhanced optimized deep ensemble network for effective facial emotion recognition
Published 2025-04-01“…Facial emotion recognition (FER) is rapidly advancing, with significant applications in healthcare, human-computer interactions, and biometric security, driven by recent advances in artificial intelligence (AI), computer vision, and deep learning. …”
Get full text
Article