Статті в журналах з теми "Identification and Authentication Techniques"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Identification and Authentication Techniques".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Warda Hassan and Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques." VFAST Transactions on Software Engineering 12, no. 1 (March 31, 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Повний текст джерелаDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini, and I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (May 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Повний текст джерелаSureshbabu, P., and M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Повний текст джерелаB S, Shruthi, and Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD." International Journal of Computer Science and Mobile Computing 12, no. 4 (April 30, 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Повний текст джерелаJoshi, V. C., and I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS." Acta Horticulturae, no. 720 (October 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Повний текст джерелаDan, Man Kan, and Dr T. Meyappan. "WATERMARKING TECHNIQUES." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Повний текст джерелаDivya, C. D., and Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey." Applied and Computational Engineering 2, no. 1 (March 22, 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Повний текст джерелаYaseen Khudhur, Doaa, Belal Al-Khateeb, and Hadeel Amjed Saeed. "Secure login technique for online banking." International Journal of Engineering & Technology 7, no. 4 (April 3, 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Повний текст джерелаSingh, Preet Amol, Neha Bajwa, Subh Naman, and Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs." Letters in Drug Design & Discovery 17, no. 9 (September 11, 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Повний текст джерелаGupta, Myra. "Biometric Authentication using Gait Recognition." Universal Research Reports 10, no. 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Повний текст джерелаSelvarani, P., and N. Malarvizhi. "Multibiometric authentication with MATLAB simulation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Повний текст джерелаZhao, Yi, and Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms." Information 15, no. 4 (March 29, 2024): 187. http://dx.doi.org/10.3390/info15040187.
Повний текст джерелаG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala, and Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (September 1, 2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Повний текст джерелаK N, Madhu, and Mrs Bhavana G. "Signature Recognition for Banking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Повний текст джерелаHossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review." Malaysian NANO-An International Journal 4, no. 1 (July 3, 2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.
Повний текст джерелаR, Dr Sharavanakumar. "EYE Blinking for Password Authentication." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Повний текст джерелаCicareli, Rodrigo dos Santos, and José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual." Semina: Ciências Exatas e Tecnológicas 41, no. 2 (December 11, 2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.
Повний текст джерелаK, Ambika, and Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication." International Journal of Electrical and Electronics Research 10, no. 4 (December 30, 2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.
Повний текст джерелаJing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning." Journal of Electrical Systems 19, no. 4 (January 25, 2024): 196–210. http://dx.doi.org/10.52783/jes.632.
Повний текст джерелаD., Ostapets, Dziuba V., and Rusetskyi V. "Tools for studying of facial identification and authentication." System technologies 4, no. 153 (May 1, 2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.
Повний текст джерелаFarid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed, and Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services." Sensors 21, no. 2 (January 14, 2021): 552. http://dx.doi.org/10.3390/s21020552.
Повний текст джерелаShaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou, and Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques." Information 9, no. 9 (August 24, 2018): 213. http://dx.doi.org/10.3390/info9090213.
Повний текст джерелаShet, Nagaraj. "Eye Based Secure Authentication System." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.
Повний текст джерелаAl-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi, and Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data." Sustainability 15, no. 13 (July 3, 2023): 10456. http://dx.doi.org/10.3390/su151310456.
Повний текст джерелаB.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Повний текст джерелаHassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (October 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Повний текст джерелаBaldini, Gianmarco, Raimondo Giuliani, and Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform." Applied Sciences 8, no. 11 (November 6, 2018): 2167. http://dx.doi.org/10.3390/app8112167.
Повний текст джерелаLin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti, and Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique." Symmetry 16, no. 10 (September 24, 2024): 1253. http://dx.doi.org/10.3390/sym16101253.
Повний текст джерелаNini, Deepthi Mohan, BSajini Krishnadas, and KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines." Ancient Science of Life 32, no. 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.
Повний текст джерелаAleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim, and Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals." Applied Sciences 13, no. 16 (August 21, 2023): 9454. http://dx.doi.org/10.3390/app13169454.
Повний текст джерелаWang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin, and Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (February 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.
Повний текст джерелаZiyatbekova, G. Z., and M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, no. 4 (December 30, 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Повний текст джерелаKharabe, Shwetambari, and C. Nalini. "Survey on finger-vein segmentation and authentication." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.
Повний текст джерелаPerez-Meana, Hector Manuel, and Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique." Telecommunications and Radio Engineering 67, no. 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.
Повний текст джерелаArjun Kharavane, Lakshmi, J. S. Awati, and M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System." Journal of Embedded Systems and Processing 8, no. 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.
Повний текст джерелаSultan, Shahad, and Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique." Journal of communications software and systems 16, no. 3 (September 15, 2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.
Повний текст джерелаNajafi, Fatemeh, Masoud Kaveh, Diego Martín, and Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks." Sensors 21, no. 6 (March 12, 2021): 2009. http://dx.doi.org/10.3390/s21062009.
Повний текст джерелаV L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 8 (December 24, 2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Повний текст джерелаAksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy." Turkish Journal of Agriculture - Food Science and Technology 9, sp (January 5, 2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.
Повний текст джерелаIngale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari, and Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.
Повний текст джерелаHebri, Dheeraj, and Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.
Повний текст джерелаC. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C., and Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.
Повний текст джерелаKusban, Muhammad, Aris Budiman, and Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (April 1, 2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.
Повний текст джерелаK. Selsiya, Dr. D. Banumathy, Nijanthan, and Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (May 31, 2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Повний текст джерелаWeerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Повний текст джерелаChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Повний текст джерелаA, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 27, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.
Повний текст джерелаSadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi, and Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings." Bioengineering 11, no. 4 (April 15, 2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.
Повний текст джерелаJ. Balachandran, M., and P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.
Повний текст джерелаDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Повний текст джерела