Artykuły w czasopismach na temat „Identification and Authentication Techniques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Identification and Authentication Techniques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Warda Hassan i Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques". VFAST Transactions on Software Engineering 12, nr 1 (31.03.2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Pełny tekst źródłaDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini i I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis". International Journal of Innovative Research in Computer Science and Technology 11, nr 3 (maj 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Pełny tekst źródłaSureshbabu, P., i M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint". Asian Journal of Computer Science and Technology 8, S1 (5.02.2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Pełny tekst źródłaB S, Shruthi, i Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD". International Journal of Computer Science and Mobile Computing 12, nr 4 (30.04.2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Pełny tekst źródłaJoshi, V. C., i I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS". Acta Horticulturae, nr 720 (październik 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Pełny tekst źródłaDan, Man Kan, i Dr T. Meyappan. "WATERMARKING TECHNIQUES". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, nr 3 (30.06.2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Pełny tekst źródłaDivya, C. D., i Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey". Applied and Computational Engineering 2, nr 1 (22.03.2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Pełny tekst źródłaYaseen Khudhur, Doaa, Belal Al-Khateeb i Hadeel Amjed Saeed. "Secure login technique for online banking". International Journal of Engineering & Technology 7, nr 4 (3.04.2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Pełny tekst źródłaSingh, Preet Amol, Neha Bajwa, Subh Naman i Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs". Letters in Drug Design & Discovery 17, nr 9 (11.09.2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Pełny tekst źródłaGupta, Myra. "Biometric Authentication using Gait Recognition". Universal Research Reports 10, nr 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Pełny tekst źródłaSelvarani, P., i N. Malarvizhi. "Multibiometric authentication with MATLAB simulation". International Journal of Engineering & Technology 7, nr 1.7 (5.02.2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Pełny tekst źródłaZhao, Yi, i Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms". Information 15, nr 4 (29.03.2024): 187. http://dx.doi.org/10.3390/info15040187.
Pełny tekst źródłaG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala i Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 7 (1.09.2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Pełny tekst źródłaK N, Madhu, i Mrs Bhavana G. "Signature Recognition for Banking System". International Journal for Research in Applied Science and Engineering Technology 10, nr 7 (31.07.2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Pełny tekst źródłaHossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review". Malaysian NANO-An International Journal 4, nr 1 (3.07.2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.
Pełny tekst źródłaR, Dr Sharavanakumar. "EYE Blinking for Password Authentication". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Pełny tekst źródłaCicareli, Rodrigo dos Santos, i José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual". Semina: Ciências Exatas e Tecnológicas 41, nr 2 (11.12.2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.
Pełny tekst źródłaK, Ambika, i Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication". International Journal of Electrical and Electronics Research 10, nr 4 (30.12.2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.
Pełny tekst źródłaJing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning". Journal of Electrical Systems 19, nr 4 (25.01.2024): 196–210. http://dx.doi.org/10.52783/jes.632.
Pełny tekst źródłaD., Ostapets, Dziuba V. i Rusetskyi V. "Tools for studying of facial identification and authentication". System technologies 4, nr 153 (1.05.2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.
Pełny tekst źródłaFarid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed i Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services". Sensors 21, nr 2 (14.01.2021): 552. http://dx.doi.org/10.3390/s21020552.
Pełny tekst źródłaShaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou i Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques". Information 9, nr 9 (24.08.2018): 213. http://dx.doi.org/10.3390/info9090213.
Pełny tekst źródłaShet, Nagaraj. "Eye Based Secure Authentication System". International Journal for Research in Applied Science and Engineering Technology 12, nr 4 (30.04.2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.
Pełny tekst źródłaAl-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi i Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data". Sustainability 15, nr 13 (3.07.2023): 10456. http://dx.doi.org/10.3390/su151310456.
Pełny tekst źródłaB.R., Rohini, i Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH". International Journal of Research -GRANTHAALAYAH 5, nr 4RACSIT (30.04.2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Pełny tekst źródłaHassan, Basma Mohammed, Khaled Mohammed Fouad i Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing". International Journal of Enterprise Information Systems 11, nr 4 (październik 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Pełny tekst źródłaBaldini, Gianmarco, Raimondo Giuliani i Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform". Applied Sciences 8, nr 11 (6.11.2018): 2167. http://dx.doi.org/10.3390/app8112167.
Pełny tekst źródłaLin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti i Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique". Symmetry 16, nr 10 (24.09.2024): 1253. http://dx.doi.org/10.3390/sym16101253.
Pełny tekst źródłaNini, Deepthi Mohan, BSajini Krishnadas i KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines". Ancient Science of Life 32, nr 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.
Pełny tekst źródłaAleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim i Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals". Applied Sciences 13, nr 16 (21.08.2023): 9454. http://dx.doi.org/10.3390/app13169454.
Pełny tekst źródłaWang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin i Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors". International Journal of Software Engineering and Knowledge Engineering 28, nr 02 (luty 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.
Pełny tekst źródłaZiyatbekova, G. Z., i M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, nr 4 (30.12.2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Pełny tekst źródłaKharabe, Shwetambari, i C. Nalini. "Survey on finger-vein segmentation and authentication". International Journal of Engineering & Technology 7, nr 1.2 (28.12.2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.
Pełny tekst źródłaPerez-Meana, Hector Manuel, i Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique". Telecommunications and Radio Engineering 67, nr 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.
Pełny tekst źródłaArjun Kharavane, Lakshmi, J. S. Awati i M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System". Journal of Embedded Systems and Processing 8, nr 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.
Pełny tekst źródłaSultan, Shahad, i Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique". Journal of communications software and systems 16, nr 3 (15.09.2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.
Pełny tekst źródłaNajafi, Fatemeh, Masoud Kaveh, Diego Martín i Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks". Sensors 21, nr 6 (12.03.2021): 2009. http://dx.doi.org/10.3390/s21062009.
Pełny tekst źródłaV L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network". International Journal of Interactive Mobile Technologies (iJIM) 12, nr 8 (24.12.2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Pełny tekst źródłaAksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy". Turkish Journal of Agriculture - Food Science and Technology 9, sp (5.01.2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.
Pełny tekst źródłaIngale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari i Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.
Pełny tekst źródłaHebri, Dheeraj, i Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review". International Journal of Engineering & Technology 7, nr 3.12 (20.07.2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.
Pełny tekst źródłaC. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C. i Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System". International Journal for Research in Applied Science and Engineering Technology 10, nr 3 (31.03.2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.
Pełny tekst źródłaKusban, Muhammad, Aris Budiman i Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication". International Journal of Electrical and Computer Engineering (IJECE) 14, nr 2 (1.04.2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.
Pełny tekst źródłaK. Selsiya, Dr. D. Banumathy, Nijanthan i Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics". International Journal of Scientific Research in Science, Engineering and Technology 11, nr 3 (31.05.2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Pełny tekst źródłaWeerasinghe, D., K. Elmufti, V. Rakocevic i M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques". Methods of Information in Medicine 47, nr 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Pełny tekst źródłaChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions". BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Pełny tekst źródłaA, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (27.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.
Pełny tekst źródłaSadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi i Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings". Bioengineering 11, nr 4 (15.04.2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.
Pełny tekst źródłaJ. Balachandran, M., i P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api". International Journal of Engineering & Technology 7, nr 4.36 (9.12.2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.
Pełny tekst źródłaDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT". INFORMATION TECHNOLOGY IN INDUSTRY 9, nr 1 (18.03.2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Pełny tekst źródła