Artigos de revistas sobre o tema "Identification and Authentication Techniques"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Identification and Authentication Techniques".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Warda Hassan e Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques". VFAST Transactions on Software Engineering 12, n.º 1 (31 de março de 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Texto completo da fonteDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini e I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis". International Journal of Innovative Research in Computer Science and Technology 11, n.º 3 (maio de 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Texto completo da fonteSureshbabu, P., e M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint". Asian Journal of Computer Science and Technology 8, S1 (5 de fevereiro de 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Texto completo da fonteB S, Shruthi, e Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD". International Journal of Computer Science and Mobile Computing 12, n.º 4 (30 de abril de 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Texto completo da fonteJoshi, V. C., e I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS". Acta Horticulturae, n.º 720 (outubro de 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Texto completo da fonteDan, Man Kan, e Dr T. Meyappan. "WATERMARKING TECHNIQUES". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, n.º 3 (30 de junho de 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Texto completo da fonteDivya, C. D., e Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey". Applied and Computational Engineering 2, n.º 1 (22 de março de 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Texto completo da fonteYaseen Khudhur, Doaa, Belal Al-Khateeb e Hadeel Amjed Saeed. "Secure login technique for online banking". International Journal of Engineering & Technology 7, n.º 4 (3 de abril de 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Texto completo da fonteSingh, Preet Amol, Neha Bajwa, Subh Naman e Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs". Letters in Drug Design & Discovery 17, n.º 9 (11 de setembro de 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Texto completo da fonteGupta, Myra. "Biometric Authentication using Gait Recognition". Universal Research Reports 10, n.º 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Texto completo da fonteSelvarani, P., e N. Malarvizhi. "Multibiometric authentication with MATLAB simulation". International Journal of Engineering & Technology 7, n.º 1.7 (5 de fevereiro de 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Texto completo da fonteZhao, Yi, e Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms". Information 15, n.º 4 (29 de março de 2024): 187. http://dx.doi.org/10.3390/info15040187.
Texto completo da fonteG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala e Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 7 (1 de setembro de 2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Texto completo da fonteK N, Madhu, e Mrs Bhavana G. "Signature Recognition for Banking System". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julho de 2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Texto completo da fonteHossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review". Malaysian NANO-An International Journal 4, n.º 1 (3 de julho de 2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.
Texto completo da fonteR, Dr Sharavanakumar. "EYE Blinking for Password Authentication". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junho de 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Texto completo da fonteCicareli, Rodrigo dos Santos, e José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual". Semina: Ciências Exatas e Tecnológicas 41, n.º 2 (11 de dezembro de 2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.
Texto completo da fonteK, Ambika, e Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication". International Journal of Electrical and Electronics Research 10, n.º 4 (30 de dezembro de 2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.
Texto completo da fonteJing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning". Journal of Electrical Systems 19, n.º 4 (25 de janeiro de 2024): 196–210. http://dx.doi.org/10.52783/jes.632.
Texto completo da fonteD., Ostapets, Dziuba V. e Rusetskyi V. "Tools for studying of facial identification and authentication". System technologies 4, n.º 153 (1 de maio de 2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.
Texto completo da fonteFarid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed e Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services". Sensors 21, n.º 2 (14 de janeiro de 2021): 552. http://dx.doi.org/10.3390/s21020552.
Texto completo da fonteShaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou e Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques". Information 9, n.º 9 (24 de agosto de 2018): 213. http://dx.doi.org/10.3390/info9090213.
Texto completo da fonteShet, Nagaraj. "Eye Based Secure Authentication System". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.
Texto completo da fonteAl-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi e Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data". Sustainability 15, n.º 13 (3 de julho de 2023): 10456. http://dx.doi.org/10.3390/su151310456.
Texto completo da fonteB.R., Rohini, e Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH". International Journal of Research -GRANTHAALAYAH 5, n.º 4RACSIT (30 de abril de 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Texto completo da fonteHassan, Basma Mohammed, Khaled Mohammed Fouad e Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing". International Journal of Enterprise Information Systems 11, n.º 4 (outubro de 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Texto completo da fonteBaldini, Gianmarco, Raimondo Giuliani e Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform". Applied Sciences 8, n.º 11 (6 de novembro de 2018): 2167. http://dx.doi.org/10.3390/app8112167.
Texto completo da fonteLin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti e Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique". Symmetry 16, n.º 10 (24 de setembro de 2024): 1253. http://dx.doi.org/10.3390/sym16101253.
Texto completo da fonteNini, Deepthi Mohan, BSajini Krishnadas e KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines". Ancient Science of Life 32, n.º 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.
Texto completo da fonteAleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim e Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals". Applied Sciences 13, n.º 16 (21 de agosto de 2023): 9454. http://dx.doi.org/10.3390/app13169454.
Texto completo da fonteWang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin e Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors". International Journal of Software Engineering and Knowledge Engineering 28, n.º 02 (fevereiro de 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.
Texto completo da fonteZiyatbekova, G. Z., e M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, n.º 4 (30 de dezembro de 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Texto completo da fonteKharabe, Shwetambari, e C. Nalini. "Survey on finger-vein segmentation and authentication". International Journal of Engineering & Technology 7, n.º 1.2 (28 de dezembro de 2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.
Texto completo da fontePerez-Meana, Hector Manuel, e Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique". Telecommunications and Radio Engineering 67, n.º 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.
Texto completo da fonteArjun Kharavane, Lakshmi, J. S. Awati e M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System". Journal of Embedded Systems and Processing 8, n.º 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.
Texto completo da fonteSultan, Shahad, e Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique". Journal of communications software and systems 16, n.º 3 (15 de setembro de 2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.
Texto completo da fonteNajafi, Fatemeh, Masoud Kaveh, Diego Martín e Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks". Sensors 21, n.º 6 (12 de março de 2021): 2009. http://dx.doi.org/10.3390/s21062009.
Texto completo da fonteV L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network". International Journal of Interactive Mobile Technologies (iJIM) 12, n.º 8 (24 de dezembro de 2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Texto completo da fonteAksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy". Turkish Journal of Agriculture - Food Science and Technology 9, sp (5 de janeiro de 2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.
Texto completo da fonteIngale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari e Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.
Texto completo da fonteHebri, Dheeraj, e Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review". International Journal of Engineering & Technology 7, n.º 3.12 (20 de julho de 2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.
Texto completo da fonteC. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C. e Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de março de 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.
Texto completo da fonteKusban, Muhammad, Aris Budiman e Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 2 (1 de abril de 2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.
Texto completo da fonteK. Selsiya, Dr. D. Banumathy, Nijanthan e Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics". International Journal of Scientific Research in Science, Engineering and Technology 11, n.º 3 (31 de maio de 2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Texto completo da fonteWeerasinghe, D., K. Elmufti, V. Rakocevic e M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques". Methods of Information in Medicine 47, n.º 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Texto completo da fonteChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions". BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Texto completo da fonteA, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (27 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.
Texto completo da fonteSadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi e Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings". Bioengineering 11, n.º 4 (15 de abril de 2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.
Texto completo da fonteJ. Balachandran, M., e P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api". International Journal of Engineering & Technology 7, n.º 4.36 (9 de dezembro de 2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.
Texto completo da fonteDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT". INFORMATION TECHNOLOGY IN INDUSTRY 9, n.º 1 (18 de março de 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Texto completo da fonte