Articoli di riviste sul tema "Identification and Authentication Techniques"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Identification and Authentication Techniques".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Warda Hassan e Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques". VFAST Transactions on Software Engineering 12, n. 1 (31 marzo 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Testo completoDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini e I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis". International Journal of Innovative Research in Computer Science and Technology 11, n. 3 (maggio 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Testo completoSureshbabu, P., e M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint". Asian Journal of Computer Science and Technology 8, S1 (5 febbraio 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Testo completoB S, Shruthi, e Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD". International Journal of Computer Science and Mobile Computing 12, n. 4 (30 aprile 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Testo completoJoshi, V. C., e I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS". Acta Horticulturae, n. 720 (ottobre 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Testo completoDan, Man Kan, e Dr T. Meyappan. "WATERMARKING TECHNIQUES". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, n. 3 (30 giugno 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Testo completoDivya, C. D., e Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey". Applied and Computational Engineering 2, n. 1 (22 marzo 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Testo completoYaseen Khudhur, Doaa, Belal Al-Khateeb e Hadeel Amjed Saeed. "Secure login technique for online banking". International Journal of Engineering & Technology 7, n. 4 (3 aprile 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Testo completoSingh, Preet Amol, Neha Bajwa, Subh Naman e Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs". Letters in Drug Design & Discovery 17, n. 9 (11 settembre 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Testo completoGupta, Myra. "Biometric Authentication using Gait Recognition". Universal Research Reports 10, n. 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Testo completoSelvarani, P., e N. Malarvizhi. "Multibiometric authentication with MATLAB simulation". International Journal of Engineering & Technology 7, n. 1.7 (5 febbraio 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Testo completoZhao, Yi, e Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms". Information 15, n. 4 (29 marzo 2024): 187. http://dx.doi.org/10.3390/info15040187.
Testo completoG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala e Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 7 (1 settembre 2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Testo completoK N, Madhu, e Mrs Bhavana G. "Signature Recognition for Banking System". International Journal for Research in Applied Science and Engineering Technology 10, n. 7 (31 luglio 2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Testo completoHossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review". Malaysian NANO-An International Journal 4, n. 1 (3 luglio 2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.
Testo completoR, Dr Sharavanakumar. "EYE Blinking for Password Authentication". International Journal for Research in Applied Science and Engineering Technology 10, n. 6 (30 giugno 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Testo completoCicareli, Rodrigo dos Santos, e José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual". Semina: Ciências Exatas e Tecnológicas 41, n. 2 (11 dicembre 2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.
Testo completoK, Ambika, e Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication". International Journal of Electrical and Electronics Research 10, n. 4 (30 dicembre 2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.
Testo completoJing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning". Journal of Electrical Systems 19, n. 4 (25 gennaio 2024): 196–210. http://dx.doi.org/10.52783/jes.632.
Testo completoD., Ostapets, Dziuba V. e Rusetskyi V. "Tools for studying of facial identification and authentication". System technologies 4, n. 153 (1 maggio 2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.
Testo completoFarid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed e Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services". Sensors 21, n. 2 (14 gennaio 2021): 552. http://dx.doi.org/10.3390/s21020552.
Testo completoShaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou e Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques". Information 9, n. 9 (24 agosto 2018): 213. http://dx.doi.org/10.3390/info9090213.
Testo completoShet, Nagaraj. "Eye Based Secure Authentication System". International Journal for Research in Applied Science and Engineering Technology 12, n. 4 (30 aprile 2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.
Testo completoAl-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi e Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data". Sustainability 15, n. 13 (3 luglio 2023): 10456. http://dx.doi.org/10.3390/su151310456.
Testo completoB.R., Rohini, e Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH". International Journal of Research -GRANTHAALAYAH 5, n. 4RACSIT (30 aprile 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Testo completoHassan, Basma Mohammed, Khaled Mohammed Fouad e Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing". International Journal of Enterprise Information Systems 11, n. 4 (ottobre 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Testo completoBaldini, Gianmarco, Raimondo Giuliani e Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform". Applied Sciences 8, n. 11 (6 novembre 2018): 2167. http://dx.doi.org/10.3390/app8112167.
Testo completoLin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti e Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique". Symmetry 16, n. 10 (24 settembre 2024): 1253. http://dx.doi.org/10.3390/sym16101253.
Testo completoNini, Deepthi Mohan, BSajini Krishnadas e KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines". Ancient Science of Life 32, n. 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.
Testo completoAleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim e Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals". Applied Sciences 13, n. 16 (21 agosto 2023): 9454. http://dx.doi.org/10.3390/app13169454.
Testo completoWang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin e Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors". International Journal of Software Engineering and Knowledge Engineering 28, n. 02 (febbraio 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.
Testo completoZiyatbekova, G. Z., e M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, n. 4 (30 dicembre 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Testo completoKharabe, Shwetambari, e C. Nalini. "Survey on finger-vein segmentation and authentication". International Journal of Engineering & Technology 7, n. 1.2 (28 dicembre 2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.
Testo completoPerez-Meana, Hector Manuel, e Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique". Telecommunications and Radio Engineering 67, n. 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.
Testo completoArjun Kharavane, Lakshmi, J. S. Awati e M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System". Journal of Embedded Systems and Processing 8, n. 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.
Testo completoSultan, Shahad, e Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique". Journal of communications software and systems 16, n. 3 (15 settembre 2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.
Testo completoNajafi, Fatemeh, Masoud Kaveh, Diego Martín e Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks". Sensors 21, n. 6 (12 marzo 2021): 2009. http://dx.doi.org/10.3390/s21062009.
Testo completoV L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network". International Journal of Interactive Mobile Technologies (iJIM) 12, n. 8 (24 dicembre 2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Testo completoAksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy". Turkish Journal of Agriculture - Food Science and Technology 9, sp (5 gennaio 2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.
Testo completoIngale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari e Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification". International Journal for Research in Applied Science and Engineering Technology 11, n. 4 (30 aprile 2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.
Testo completoHebri, Dheeraj, e Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review". International Journal of Engineering & Technology 7, n. 3.12 (20 luglio 2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.
Testo completoC. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C. e Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System". International Journal for Research in Applied Science and Engineering Technology 10, n. 3 (31 marzo 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.
Testo completoKusban, Muhammad, Aris Budiman e Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication". International Journal of Electrical and Computer Engineering (IJECE) 14, n. 2 (1 aprile 2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.
Testo completoK. Selsiya, Dr. D. Banumathy, Nijanthan e Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics". International Journal of Scientific Research in Science, Engineering and Technology 11, n. 3 (31 maggio 2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Testo completoWeerasinghe, D., K. Elmufti, V. Rakocevic e M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques". Methods of Information in Medicine 47, n. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Testo completoChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions". BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Testo completoA, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 04 (27 aprile 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.
Testo completoSadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi e Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings". Bioengineering 11, n. 4 (15 aprile 2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.
Testo completoJ. Balachandran, M., e P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api". International Journal of Engineering & Technology 7, n. 4.36 (9 dicembre 2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.
Testo completoDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT". INFORMATION TECHNOLOGY IN INDUSTRY 9, n. 1 (18 marzo 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Testo completo