|
|
|
Alonso Barrios Trilleras, Ana Milena Lopez Aguirre, Victor Manuel Nieto Rodriguez
Pág. 137 - 149
ResumenDescargasReferenciasCómo citar
|
|
|
|
|
|
|
Maria Louro da Silva, Carolina Gouveia, Daniel Filipe Albuquerque and Hugo Plácido da Silva
Bio-Radar (BR) systems have shown great promise for biometric applications. Conventional methods can be forged, or fooled. Even alternative methods intrinsic to the user, such as the Electrocardiogram (ECG), present drawbacks as they require contact with...
ver más
|
|
|
|
|
|
|
Isaac R. Vincent, Erin N. Rosskopf, Jeffrey K. Brecht, Nicholas S. Dufault, Germán Sandoya-Miranda and Xin Zhao
The use of high tunnels, which allows growers to extend their season and improve yields, is increasing in the Southeastern U.S., yet growers face challenges related to weed and disease management, particularly in organic systems. On-station experiments w...
ver más
|
|
|
|
|
|
|
Abdulwahid Al Abdulwahid
Ethnic conflicts frequently lead to violations of human rights, such as genocide and crimes against humanity, as well as economic collapse, governmental failure, environmental problems, and massive influxes of refugees. Many innocent people suffer as a r...
ver más
|
|
|
|
|
|
|
Munir Ahmad, Sagheer Abbas, Areej Fatima, Ghassan F. Issa, Taher M. Ghazal and Muhammad Adnan Khan
The importance of accurate livestock identification for the success of modern livestock industries cannot be overstated as it is essential for a variety of purposes, including the traceability of animals for food safety, disease control, the prevention o...
ver más
|
|
|
|
|
|
|
Juan Carlos Atenco, Juan Carlos Moreno and Juan Manuel Ramirez
In this work we present a bimodal multitask network for audiovisual biometric recognition. The proposed network performs the fusion of features extracted from face and speech data through a weighted sum to jointly optimize the contribution of each modali...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Yu-Ming Zhang, Chia-Yuan Cheng, Chih-Lung Lin, Chun-Chieh Lee and Kuo-Chin Fan
Biometrics has become an important research issue in recent years, and the use of deep learning neural networks has made it possible to develop more reliable and efficient recognition systems. Palms have been identified as one of the most promising candi...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Abdullahi A. Ibrahim, Muhammad Khan, Chukwuma Nnaji and Amanda S. Koh
Heat-related illness is a growing concern for workers in temperate climates as rising temperatures and heatwaves put them at risk of exertional heat stroke. Monitoring biometrics that predict heat stroke, such as core temperature, is increasingly importa...
ver más
|
|
|
|