Showing 201 - 220 results of 461 for search '"fingerprint"', query time: 0.04s Refine Results
  1. 201

    Robust image hiding algorithm for secure multimodal biometrics by Yu-qiang CAO, Wei-guo GONG, Sen BAI

    Published 2016-09-01
    “…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
    Get full text
    Article
  2. 202

    A digital signature scheme based on shared key in intelligent terminal by Guorong LIU, Dongxin LIU, Laifu WANG, Jun SHEN, Huamin JIN

    Published 2017-02-01
    “…In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.…”
    Get full text
    Article
  3. 203

    Developing a Health Support System to Promote Care for the Elderly by Marcell Szántó, Lehel Dénes-Fazakas, Erick Noboa, Levente Kovács, Döníz Borsos, György Eigner, Éva-H. Dulf

    Published 2025-01-01
    “…The proposed armband also includes a fingerprint identification system that allows only authorized personnel to use it. …”
    Get full text
    Article
  4. 204

    Quantitative Analysis of the Multicomponent and Spectrum–Effect Correlation of the Antispasmodic Activity of Shaoyao-Gancao Decoction by Yanli Xu, Chenxi Li, Ting Chen, Xiaochun Li, Xiaoyu Wu, Qili Zhang, Lei Zhao

    Published 2022-01-01
    “…The common peaks of fingerprints were evaluated by the similarity with the chromatographic fingerprints of the TCM. …”
    Get full text
    Article
  5. 205

    Parameters Influencing Sulfur Speciation in Environmental Samples Using Sulfur K-Edge X-Ray Absorption Near-Edge Structure by Siwatt Pongpiachan, Kanjana Thumanu, Charnwit Kositanont, Klaus Schwarzer, Jörg Prietzel, Phoosak Hirunyatrakul, Itthipon Kittikoon

    Published 2012-01-01
    “…This paper aims to enhance the credibility of applying the sulfur K-edge XANES spectroscopy as an innovative “fingerprint” for characterizing environmental samples. …”
    Get full text
    Article
  6. 206

    Authentication-based double images fractal watermarking model of vector maps by SUN Jian-guo1, MEN Chao-guang1, MA Chun-guang1, LI Cheng-ming2

    Published 2009-01-01
    “…To realize the invasion identification and copyright authentication, a novel digital watermarking model for vector maps based on authentication was introduced.A double images fractal coding technology was proposed for the compound images, namely, the map owner’s fingerprint was taken as the domain blocks and the vector map was taken as range blocks.The control parameters of fractal similarity computation were defined as watermarking, which could be embedded into the properties file of the map.Experiments and analysis show that, besides providing services of copyright protection, the model improves the robustness and the owners’ authentication probability.…”
    Get full text
    Article
  7. 207

    Measurement of video initial buffer size for mobile network by Guang CHENG, Min FANG, Hua WU

    Published 2019-10-01
    “…To resolve the difficulty in accurately measure the length of video initial buffering queue,two video platforms,non-encrypted Youku and encrypted YouTube,were selected to research,and the video initial buffer queue length measurement method was proposed.By identifying and analyzing the characteristics of video traffic,correlating the traffic behavior with the playing state,constructing video fingerprint database,accurate measurement of queue length was realized.The experimental results show that the measurement results of the two types could be accurate to the frame,fully meeting the need to accurately evaluate the quality of the video experience.…”
    Get full text
    Article
  8. 208

    Research on indoor localization algorithm based on kernel principal component analysis by Hua-liang LI, Zhi-hong QIAN, Hong-liang TIAN

    Published 2017-01-01
    “…An indoor localization algorithm based on kernel principal component analysis (KPCA) was proposed.It applied KPCA to train the original location fingerprint (OLF) and extract the nonlinear feature of the OLF data at the offline stage,such that the information of all AP was more efficiently utilized.At the online stage,an improved weight k-nearest neighbor algorithm for positioning which could automatically choose neighbors was proposed.The experiments were carried out in a realistic WLAN environment.The results show that the algorithm outperforms the existing methods in terms of the mean error and localization accuracy.Moreover,it requires less times of RSS acquisition and AP number.…”
    Get full text
    Article
  9. 209

    Trusted computing mobile terminal application research based on biometric trusted access protocol by Jun XU

    Published 2017-02-01
    “…The experimental results show that the new protocol has a small increase in the time overhead, and the fingerprint template is updated in TPM, which effectively increases the recognition rate.…”
    Get full text
    Article
  10. 210

    Research on the IP alias resolution technology by Zhanfeng WANG, Guang CHENG, Chao HU, Han LI, Nianfeng WENG, Huaping CAO

    Published 2019-07-01
    “…IP alias resolution,the procedure of identifying IP addresses belonging to the same router,is a critical step in Internet topology inference.It can convert the Internet logical topology into physical topology,and bridge the gap between the virtual world and real world.First the concept of IP alias resolution was introduced and the classical IP alias relationships were analyzed.Then the IPv4 alias resolution algorithms and the IPv6 alias resolution algorithms were discussed in detail separately.Finally,through the comprehensive analysis and comparison of all the algorithms,the research directions in the future especially in IPv6 alias resolution were pointed out in three folds such as alias target set selection,fingerprint selection and inference methods.…”
    Get full text
    Article
  11. 211

    Application of Interactive Multi-Biometrics Recognition on E-Commerce by Ling Tan, Lu Zhang

    Published 2015-10-01
    “…An interactive multi-biometrics recognition method was proposed,and its application on e-commerce was researched from third-party payment platform.For our interactive multi-biometrics recognition,the identification of users was accomplished with the recognition of multi-biometrics features like nose,ear,and finger-knuckle-print.Payment confirmation and signature were achieved with interactive face scan and fingerprint identification.A frame of third party payment platform was designed,based on which a simple and light-weighted pre-authentication layered model for online payment was established.This model can well guarantee security and reliability of payers,sellers,and banks,simplify the process of payment for users as well.…”
    Get full text
    Article
  12. 212

    Association and application in XDR and MR data by Tao LIU, Tao WU, Bin WANG

    Published 2019-04-01
    “…Based on the XDR and MR data records of O domain and combining with the development and practice in big data and machine learning technologies,the analysis of impact factors of correlation rate and accuracy was described in detail via practice with the help of technology of association of XDR and MR data records.By means of the integration of machine learning technology and fingerprint localization algorithm,the position accuracy was promoted constantly using the random forest algorithm,and the rasterization of associated data was realized.Simultaneously,the innovative application scenarios and directions applied to planning,network,customer and market were proposed.Finally,to verify the prospect of the association of XDR and MR data records,two examples in network construction,maintain and market were enumerated.…”
    Get full text
    Article
  13. 213

    Genotyping <em> Escherichia coli </em> O157:H7 strains isolated from cattle and small ruminants in Fars province (Iran) using Enterobacterial Repetitive Intergenic Consensus PCR A... by Sedigheh Mokhtari, Yahya Tahamtan, Mohammad Kargar, Keyvan Tadayon, Elham Moazamian

    Published 2024-11-01
    “…Results: The genetic relationships and potential cross-contamination among isolates were evaluated using the fingerprint patterns obtained. Their similarities ranged from 46% to 100%. …”
    Get full text
    Article
  14. 214

    Molecular Vibration-Activity Relationship in the Agonism of Adenosine Receptors by Hyun Keun Chee, S. June Oh

    Published 2013-12-01
    “…The resulting dendrogram was compared with those of another kind of fingerprint or descriptor. The dendrogram result produced by corralled intensity of molecular vibrational frequency outperformed four other analyses in the current study of adenosine receptor agonism and antagonism. …”
    Get full text
    Article
  15. 215

    Automated class student counting through image processing by Agyan Panda, Azadeh Shemshad

    Published 2021-03-01
    “…Standard biometrics such as fingerprint and iris recognition have been used in automated systems in recent years. …”
    Get full text
    Article
  16. 216

    Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token by Zhaohua Zheng, Jinlian Peng, Jieren Cheng

    Published 2014-09-01
    “…After analyzing the current dynamic password shortcomings, a dynamic password authentication scheme based on improved mobile phone token to challenge / response was proposed. It uses fingerprint as the evidence of token, and can be two-way authentication, and has segment of double channel encryption communication. …”
    Get full text
    Article
  17. 217

    Serum and plasma as a good candidates of body fluids for detection lung cancer by FTIR liquid biopsy by Jolanta Smok-Kalwat, Stanisław Góźdź, Paweł Macek, Zuzanna Kalwat, Maryna Khalavka, Wioletta Rzad, Andrzej Stepulak, Joanna Depciuch

    Published 2024-12-01
    “…Moreover, it was also showed that fingerprint range gave a better distinction between the studied patient groups than the lipid range. …”
    Get full text
    Article
  18. 218

    IoT business guarantee method based on behavioral portrait by Longgang ZHAO, Hansheng LIU, Feng WANG, Shuang DI

    Published 2021-05-01
    “…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
    Get full text
    Article
  19. 219

    Origin of Meteoric Fluids in Extensional Detachments by Paul D. Bons, Enrique Gomez-Rivas

    Published 2020-01-01
    “…Extension or rapid exhumation, such as that experienced by metamorphic core complexes, which results in decompression or fluid heating can release these old “meteoric” fluids, of which we find the isotopic fingerprint in veins and shear zone minerals.…”
    Get full text
    Article
  20. 220

    Indoor positioning algorithm research based on the typicality judgment of RSS by Jia-ying WU, Wei-hong XU, Shun-ming CHEN, Ping LI

    Published 2014-11-01
    “…In the process of indoor location based on RSS fingerprint,the quality of the obtained similar point set is a key factor for a successful position.And the locating point’s RSS is an important reason which affects the quality of the similar point set.By analyzing the distribution of D-RSS,the concept of RSS’s typicality was proposed firstly,and an indoor localization algorithm based on typicality judgment of RSS was also presented.According to the principle that the RSS values and the effective similar sample points,a typicality discrimination method for RSS values and a self-adapting K value were presented.Confirmed by the experiments,the algorithm not only can find the effective similarity sample points completely,but also can eliminate the non-substantive similarities points,and then can adapt to the different scenes,then have the higher positioning accuracy.…”
    Get full text
    Article