|
|
|
Randy Connolly
A recurring motif in recent scholarship in the computing ethics and society studies (CESS) subfield within computing have been the calls for a wider recognition of the social and political nature of computing work. These calls have highlighted the limita...
ver más
|
|
|
|
|
|
Yu-Shiuan Tsai and Si-Jie Chen
In terms of gait recognition, face recognition is currently the most commonly used technology with high accuracy. However, in an image, there is not necessarily a face. Therefore, face recognition cannot be used if there is no face at all. However, when ...
ver más
|
|
|
|
|
|
Jin-A Lee and Keun-Chang Kwak
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du...
ver más
|
|
|
|
|
|
Jackson Horlick Teng, Thian Song Ong, Tee Connie, Kalaiarasi Sonai Muthu Anbananthen and Pa Pa Min
The finger vein recognition system uses blood vessels inside the finger of an individual for identity verification. The public is in favor of a finger vein recognition system over conventional passwords or ID cards as the biometric technology is harder t...
ver más
|
|
|
|
|
|
E.E. Istratova,D.N. Dostovalov,E.A. Bukhamer
Pág. 41 - 45
Personal identification systems are widely used in everyday life. There are many methods for extracting faces in the original image, the most perspective of which is the usage of algorithms based on neural networks. The aim of the study was to design and...
ver más
|
|
|