Showing 261 - 280 results of 383 for search '"biometrics"', query time: 0.05s Refine Results
  1. 261

    Sleep and cardiorespiratory function assessed by a smart bed over 10 weeks post COVID-19 infection by Gary Garcia-Molina, Dmytro Guzenko, Susan DeFranco, Mark S. Aloia, Rajasi Mills, Faisal Mushtaq, Virend K. Somers, Eve Van Cauter

    Published 2025-01-01
    “…We used smart beds to record biometric data following COVID-19 infection in nonhospitalized patients. …”
    Get full text
    Article
  2. 262

    Lightweight PUF-based anonymous authentication protocol in V2G by FAN Xinyue, LIU Jie, HE Jiahui

    Published 2024-10-01
    “…By combining fuzzy extractors with biometric features and user passwords, two-factor authentication, password and biometric feature update functions were implemented. …”
    Get full text
    Article
  3. 263

    Feature-Level vs. Score-Level Fusion in the Human Identification System by Rabab A. Rasool

    Published 2021-01-01
    “…The design of a robust human identification system is in high demand in most modern applications such as internet banking and security, where the multifeature biometric system, also called feature fusion biometric system, is one of the common solutions that increases the system reliability and improves recognition accuracy. …”
    Get full text
    Article
  4. 264

    Rancang Bangun Alat Pengenal Finger Vein Menggunakan Raspberry Pi dengan Metode Convolutional Neural Network (CNN) by Barlian Henryranu Prasetio, Jevandika, Dahnial Syauqy

    Published 2024-10-01
    “…A biometric recognition system has advantages and certainly some limitations in terms of performance and convenience. …”
    Get full text
    Article
  5. 265

    Evaluation of the Repeatability and the Reproducibility of AL-Scan Measurements Obtained by Residents by Mehmet Kola, Hikmet Duran, Adem Turk, Suleyman Mollamehmetoglu, Ahmet Kalkisim, Hidayet Erdol

    Published 2014-01-01
    “…The AL-Scan device exhibits good repeatability and reproducibility in all biometric measurements and IOL power calculations, independent of the operator concerned.…”
    Get full text
    Article
  6. 266

    Organoleptic properties and neuroimaging response on the perception of edible gels by Jakub Berčík, Vladimír Vietoris, Melina Korčok, Adriana Rusková, Ján Durec, Katarína Neomániová

    Published 2025-01-01
    “…This highlights the need to use biometric and neuroimaging methods in food research in order to create more optimal formulations for specific populations.…”
    Get full text
    Article
  7. 267

    Predictors of Endothelial Cell Loss after Phacoemulsification for the Treatment of Primary Angle Closure by Carlo Alberto Cutolo, Chiara Bonzano, Carlo Catti, Alessandro Bagnis, Riccardo Scotto, Letizia Negri, Sara Olivari, Francesca Cappelli, Carlo Enrico Traverso

    Published 2019-01-01
    “…The change in ECD and its relation to clinical characteristics and biometric parameters were evaluated by linear regression analysis. …”
    Get full text
    Article
  8. 268

    Fingerprint abnormalities in systemic sclerosis: Results of a single center pilot study by Kodishala Chanakya, Liza Rajasekhar

    Published 2018-01-01
    “…Documentation of this abnormality should allow the use of other biometric tools for personal identification.…”
    Get full text
    Article
  9. 269

    Sparse Matrix for ECG Identification with Two-Lead Features by Kuo-Kun Tseng, Jiao Luo, Robert Hegarty, Wenmin Wang, Dong Haiting

    Published 2015-01-01
    “…Electrocardiograph (ECG) human identification has the potential to improve biometric security. However, improvements in ECG identification and feature extraction are required. …”
    Get full text
    Article
  10. 270

    Design and Development of Polymer-Based Optical Fiber Sensor for GAIT Analysis by Mamidipaka Hema, Jami Venkata Suman, Boddepalli Kiran Kumar, Adisu Haile

    Published 2023-01-01
    “…In the present scenario like COVID-19 pandemic, to maintain physical distance, the gait-based biometric is a must. Human gait identification is a very difficult process, but it is a suitable distance biometric that also gives good results at low resolution conditions even with face features that are not clear. …”
    Get full text
    Article
  11. 271

    Evaluation of Spatial Spillover Effect of Multidimensional Hybrid Financial Risk Contagion Based on the DAI Spatial Econometric Model by Shanshen Li, Zhonghui Dong

    Published 2023-01-01
    “…Multimedia modeling in Health Cloud biometric authentication and data management systems can be applied to the analysis of financial markets. …”
    Get full text
    Article
  12. 272

    The effect of acorn scarification on the growth and root system size of Quercus robur L. seedlings grown in nursery containers by Mariusz Kormanek, Paweł Tylek, Jacek Banach, Zdzisław Kaliniewicz

    Published 2025-01-01
    “…The obtained results confirmed the positive effect of seed scarification on germination and emergence efficiency, as well as on biometric features and the quality of the grown seedlings.…”
    Get full text
    Article
  13. 273

    Iris Recognition Using Image Moments and k-Means Algorithm by Yaser Daanial Khan, Sher Afzal Khan, Farooq Ahmad, Saeed Islam

    Published 2014-01-01
    “…This paper presents a biometric technique for identification of a person using the iris image. …”
    Get full text
    Article
  14. 274

    Exploring fetal growth patterns in the second trimester: insights from ultrasound measurements among the Minangkabau Ethnic Group in Indonesia by Yusrawati, Joserizal Serudji, Bobby Indra Utama, Puspita Sari

    Published 2025-01-01
    “…Results Demographically, most participants were 21–30 years old, primigravida, with senior high school education, and employed. Fetal biometric measurements displayed increasing variability with gestational age. …”
    Get full text
    Article
  15. 275

    Survey of security for Android smart terminal by Yan-ping XU, Zhao-feng MA, Zhong-hua WANG, Xin-xin NIU, Yi-xian YANG

    Published 2016-06-01
    “…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
    Get full text
    Article
  16. 276

    Two-factor wearable device authentication protocol based on PUF and IPI by Jun WANG, Shu-bo LIU, Cai LIANG, Yong-kai LI

    Published 2017-06-01
    “…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
    Get full text
    Article
  17. 277

    The efficacy of chelated micronutrient fertilisers in tomato cultivation by Volodymyr Sievidov, Oksana Serhienko, Ivan Lebedynskyi, Igor Sievidov

    Published 2024-12-01
    “…It was observed that plants subjected to foliar fertilisation had superior biometric indicators during the mass flowering phase. …”
    Get full text
    Article
  18. 278

    QR code security management system based on WPKI and iris recognition by Yu FU, Lianliang SUN, Xiaoping WU

    Published 2018-05-01
    “…Aiming at the deficiency of existing QR code security technology,a security management system based on WPKI and iris recognition was designed and implemented.The system uses digital certificates to sign the hashed information for the user to verify the source of the QR code based on WPKI technology.Through the public security household registration management system,WPKI/CA system,server and mobile client four subsystems to standardize the management of the production and identification of QR code,and the application for the certificate of the user real name certification combined with biometric identification technology,indirectly realizing the binding of digital certificates and user physical identities to form a set of accountability mechanisms.Test results show that the system can meet accuracy and robustness requirements.…”
    Get full text
    Article
  19. 279

    Reproductive biology of catfish, Pachypterus atherinoides (Bloch, 1794) with Special Reference to lentic and lotic ecosystem by Angsuman Chanda, Godhuli Sit, Arun Jana

    Published 2024-08-01
    “…This study would help aquaculturists in the culture, captive breeding, and conservation of P. atherinoides and also help researchers in the biometric study of another fish.…”
    Get full text
    Article
  20. 280

    Attention-enhanced optimized deep ensemble network for effective facial emotion recognition by Taimoor Khan, Muhammad Yasir, Chang Choi

    Published 2025-04-01
    “…Facial emotion recognition (FER) is rapidly advancing, with significant applications in healthcare, human-computer interactions, and biometric security, driven by recent advances in artificial intelligence (AI), computer vision, and deep learning. …”
    Get full text
    Article