[HTML][HTML] A comprehensive survey of fingerprint presentation attack detection
K Karampidis, M Rousouliotis, E Linardos… - … , Security and Safety, 2021 - oaepublish.com
Nowadays, the number of people that utilize either digital applications or machines is
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …
Perimeter degree technique for the reduction of routing congestion during placement in physical design of VLSI circuits
When used in conjunction with the current floorplan and the optimization technique in circuit
design engineering, this research allows for the evaluation of design parameters that can be …
design engineering, this research allows for the evaluation of design parameters that can be …
Detection of lung cancer in CT scans using grey wolf optimization algorithm and recurrent neural network
Purpose For radiologists, identifying and assessing thelung nodules of cancerous form from
CT scans is a difficult and laborious task. As a result, early lung growing prediction is …
CT scans is a difficult and laborious task. As a result, early lung growing prediction is …
Deep learning based representation for face recognition
Face Recognition is one of the challenging process due to huge amount of wild datasets.
Deep learning has been provided good solution in terms of recognition performance, as day …
Deep learning has been provided good solution in terms of recognition performance, as day …
Security in IoT mesh networks based on trust similarity
Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to
communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly …
communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly …
Robust and high-security fingerprint recognition system using optical coherence tomography
Traditional fingerprint recognition systems are vulnerable to attacks, such as the use of
artificial fingerprints, and poor performance will be achieved if the captured surface …
artificial fingerprints, and poor performance will be achieved if the captured surface …
An improved harmony search approach for block placement for VLSI design automation
S Karimullah, D Vishnuvardhan, M Arif… - Wireless …, 2022 - Wiley Online Library
The technology grows quickly in the area of the VLSI physical design; it is crucial to integrate
the greater number of transistors and parts into a very small range. Before the placement is …
the greater number of transistors and parts into a very small range. Before the placement is …
[HTML][HTML] An optimal method for identification of finger vein using supervised learning
S Shakil, D Arora, T Zaidi - Measurement: Sensors, 2023 - Elsevier
The identification of finger vein is very advanced biometric technique and also behove an
important discipline in biometric area, accommodating growing attention in last years. In the …
important discipline in biometric area, accommodating growing attention in last years. In the …
Facial skincare products' recommendation with computer vision technologies
Acne is a skin issue that plagues many young people and adults. Even if it is cured, it leaves
acne spots or acne scars, which drives many individuals to use skincare products or …
acne spots or acne scars, which drives many individuals to use skincare products or …
Fingerprint liveness detection approaches: a survey
M Chen, C Yuan, Y Lv - International Journal of …, 2023 - inderscienceonline.com
In contemporary society, with the popularity of smart wearable devices, people are more
inclined to use convenient and efficient identity verification based on biometrics. Human …
inclined to use convenient and efficient identity verification based on biometrics. Human …