Artículos de revistas sobre el tema "Identification and Authentication Techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Identification and Authentication Techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Warda Hassan y Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques". VFAST Transactions on Software Engineering 12, n.º 1 (31 de marzo de 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Texto completoDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini y I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis". International Journal of Innovative Research in Computer Science and Technology 11, n.º 3 (mayo de 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Texto completoSureshbabu, P. y M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint". Asian Journal of Computer Science and Technology 8, S1 (5 de febrero de 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Texto completoB S, Shruthi y Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD". International Journal of Computer Science and Mobile Computing 12, n.º 4 (30 de abril de 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Texto completoJoshi, V. C. y I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS". Acta Horticulturae, n.º 720 (octubre de 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Texto completoDan, Man Kan y Dr T. Meyappan. "WATERMARKING TECHNIQUES". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, n.º 3 (30 de junio de 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Texto completoDivya, C. D. y Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey". Applied and Computational Engineering 2, n.º 1 (22 de marzo de 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Texto completoYaseen Khudhur, Doaa, Belal Al-Khateeb y Hadeel Amjed Saeed. "Secure login technique for online banking". International Journal of Engineering & Technology 7, n.º 4 (3 de abril de 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Texto completoSingh, Preet Amol, Neha Bajwa, Subh Naman y Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs". Letters in Drug Design & Discovery 17, n.º 9 (11 de septiembre de 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Texto completoGupta, Myra. "Biometric Authentication using Gait Recognition". Universal Research Reports 10, n.º 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Texto completoSelvarani, P. y N. Malarvizhi. "Multibiometric authentication with MATLAB simulation". International Journal of Engineering & Technology 7, n.º 1.7 (5 de febrero de 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Texto completoZhao, Yi y Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms". Information 15, n.º 4 (29 de marzo de 2024): 187. http://dx.doi.org/10.3390/info15040187.
Texto completoG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala y Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 7 (1 de septiembre de 2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Texto completoK N, Madhu y Mrs Bhavana G. "Signature Recognition for Banking System". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Texto completoHossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review". Malaysian NANO-An International Journal 4, n.º 1 (3 de julio de 2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.
Texto completoR, Dr Sharavanakumar. "EYE Blinking for Password Authentication". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junio de 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Texto completoCicareli, Rodrigo dos Santos y José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual". Semina: Ciências Exatas e Tecnológicas 41, n.º 2 (11 de diciembre de 2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.
Texto completoK, Ambika y Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication". International Journal of Electrical and Electronics Research 10, n.º 4 (30 de diciembre de 2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.
Texto completoJing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning". Journal of Electrical Systems 19, n.º 4 (25 de enero de 2024): 196–210. http://dx.doi.org/10.52783/jes.632.
Texto completoD., Ostapets, Dziuba V. y Rusetskyi V. "Tools for studying of facial identification and authentication". System technologies 4, n.º 153 (1 de mayo de 2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.
Texto completoFarid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed y Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services". Sensors 21, n.º 2 (14 de enero de 2021): 552. http://dx.doi.org/10.3390/s21020552.
Texto completoShaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou y Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques". Information 9, n.º 9 (24 de agosto de 2018): 213. http://dx.doi.org/10.3390/info9090213.
Texto completoShet, Nagaraj. "Eye Based Secure Authentication System". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.
Texto completoAl-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi y Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data". Sustainability 15, n.º 13 (3 de julio de 2023): 10456. http://dx.doi.org/10.3390/su151310456.
Texto completoB.R., Rohini y Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH". International Journal of Research -GRANTHAALAYAH 5, n.º 4RACSIT (30 de abril de 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Texto completoHassan, Basma Mohammed, Khaled Mohammed Fouad y Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing". International Journal of Enterprise Information Systems 11, n.º 4 (octubre de 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Texto completoBaldini, Gianmarco, Raimondo Giuliani y Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform". Applied Sciences 8, n.º 11 (6 de noviembre de 2018): 2167. http://dx.doi.org/10.3390/app8112167.
Texto completoLin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti y Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique". Symmetry 16, n.º 10 (24 de septiembre de 2024): 1253. http://dx.doi.org/10.3390/sym16101253.
Texto completoNini, Deepthi Mohan, BSajini Krishnadas y KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines". Ancient Science of Life 32, n.º 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.
Texto completoAleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim y Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals". Applied Sciences 13, n.º 16 (21 de agosto de 2023): 9454. http://dx.doi.org/10.3390/app13169454.
Texto completoWang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin y Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors". International Journal of Software Engineering and Knowledge Engineering 28, n.º 02 (febrero de 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.
Texto completoZiyatbekova, G. Z. y M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, n.º 4 (30 de diciembre de 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Texto completoKharabe, Shwetambari y C. Nalini. "Survey on finger-vein segmentation and authentication". International Journal of Engineering & Technology 7, n.º 1.2 (28 de diciembre de 2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.
Texto completoPerez-Meana, Hector Manuel y Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique". Telecommunications and Radio Engineering 67, n.º 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.
Texto completoArjun Kharavane, Lakshmi, J. S. Awati y M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System". Journal of Embedded Systems and Processing 8, n.º 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.
Texto completoSultan, Shahad y Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique". Journal of communications software and systems 16, n.º 3 (15 de septiembre de 2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.
Texto completoNajafi, Fatemeh, Masoud Kaveh, Diego Martín y Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks". Sensors 21, n.º 6 (12 de marzo de 2021): 2009. http://dx.doi.org/10.3390/s21062009.
Texto completoV L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network". International Journal of Interactive Mobile Technologies (iJIM) 12, n.º 8 (24 de diciembre de 2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Texto completoAksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy". Turkish Journal of Agriculture - Food Science and Technology 9, sp (5 de enero de 2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.
Texto completoIngale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari y Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.
Texto completoHebri, Dheeraj y Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review". International Journal of Engineering & Technology 7, n.º 3.12 (20 de julio de 2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.
Texto completoC. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C. y Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de marzo de 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.
Texto completoKusban, Muhammad, Aris Budiman y Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 2 (1 de abril de 2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.
Texto completoK. Selsiya, Dr. D. Banumathy, Nijanthan y Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics". International Journal of Scientific Research in Science, Engineering and Technology 11, n.º 3 (31 de mayo de 2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Texto completoWeerasinghe, D., K. Elmufti, V. Rakocevic y M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques". Methods of Information in Medicine 47, n.º 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Texto completoChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions". BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Texto completoA, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (27 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.
Texto completoSadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi y Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings". Bioengineering 11, n.º 4 (15 de abril de 2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.
Texto completoJ. Balachandran, M. y P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api". International Journal of Engineering & Technology 7, n.º 4.36 (9 de diciembre de 2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.
Texto completoDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT". INFORMATION TECHNOLOGY IN INDUSTRY 9, n.º 1 (18 de marzo de 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Texto completo