Zobrazeno 1 - 10
of 19
pro vyhledávání: '"J. Jenkin Winston"'
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 13, Iss 1 (2020)
The concern over security in all fields has intensified over the years. The prefatory phase of providing security begins with authentication to provide access. In many scenarios, this authentication is provided by biometric systems. Moreover, the thr
Externí odkaz:
https://doaj.org/article/14021f0b0d0a4dc2933f2308334ab5fe
Publikováno v:
2023 4th International Conference on Signal Processing and Communication (ICSPC).
Publikováno v:
International Journal of Communication Systems. 36
Autor:
Bharat Bhushan, Mohd Helmy Abd Wahab, K. Martin Sagayam, J. Jenkin Winston, Radzi Ambar, Hazwaj Mhd Poad, Ambar
Publikováno v:
Annals of Emerging Technologies in Computing. 5:27-33
Surveillance is described as close observation; this term is used mostly when it comes to security observations and recording. Nowadays in our daily life we see the need of security rising up with the constant increase in the world of technology and
Publikováno v:
Machine Learning Techniques for Smart City Applications: Trends and Solutions ISBN: 9783031088582
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c84c5067b5798ef12a04831b99000742
https://doi.org/10.1007/978-3-031-08859-9_17
https://doi.org/10.1007/978-3-031-08859-9_17
This paper briefly explains about the application of deep learning-based methods for biometric applications. This work attempts to solve the problem of limited availability of datasets which affects accuracy of the classifiers. This paper explores th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d3b5ff529e9238b10afa513e9f3babc1
https://doi.org/10.1007/s11042-021-11482-y
https://doi.org/10.1007/s11042-021-11482-y
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 13, Iss 1 (2020)
The concern over security in all fields has intensified over the years. The prefatory phase of providing security begins with authentication to provide access. In many scenarios, this authentication is provided by biometric systems. Moreover, the thr
Autor:
J. Jenkin Winston, D. Jude Hemanth
Publikováno v:
Soft Computing. 23:9361-9384
Iris image-based biometric systems are commonly used in applications that demand security, authentication, recognition and faster login access. In solving these real-time problems, the impact of soft computing techniques which employ cognitive skills
Autor:
D. Jude Hemanth, J. Jenkin Winston
Publikováno v:
Expert Systems. 38
Publikováno v:
2019 2nd International Conference on Signal Processing and Communication (ICSPC).
In today's world, security has gotten paramount. Many biometric methods like facial expression recognition system and Iris recognition system have been developed. Iris biometry helps in identifying an individual in a more intuitive and natural manner