[HTML][HTML] A comprehensive survey of fingerprint presentation attack detection

K Karampidis, M Rousouliotis, E Linardos… - … , Security and Safety, 2021 - oaepublish.com
Nowadays, the number of people that utilize either digital applications or machines is
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …

Perimeter degree technique for the reduction of routing congestion during placement in physical design of VLSI circuits

K Lakshmanna, F Shaik, VK Gunjan, N Singh… - …, 2022 - Wiley Online Library
When used in conjunction with the current floorplan and the optimization technique in circuit
design engineering, this research allows for the evaluation of design parameters that can be …

Detection of lung cancer in CT scans using grey wolf optimization algorithm and recurrent neural network

VK Gunjan, N Singh, F Shaik, S Roy - Health and Technology, 2022 - Springer
Purpose For radiologists, identifying and assessing thelung nodules of cancerous form from
CT scans is a difficult and laborious task. As a result, early lung growing prediction is …

Deep learning based representation for face recognition

PS Prasad, R Pathak, VK Gunjan… - … 2019: Proceedings of the …, 2020 - Springer
Face Recognition is one of the challenging process due to huge amount of wild datasets.
Deep learning has been provided good solution in terms of recognition performance, as day …

Security in IoT mesh networks based on trust similarity

A Kavitha, VB Reddy, N Singh, VK Gunjan… - IEEE …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to
communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly …

Robust and high-security fingerprint recognition system using optical coherence tomography

F Liu, G Liu, Q Zhao, L Shen - Neurocomputing, 2020 - Elsevier
Traditional fingerprint recognition systems are vulnerable to attacks, such as the use of
artificial fingerprints, and poor performance will be achieved if the captured surface …

An improved harmony search approach for block placement for VLSI design automation

S Karimullah, D Vishnuvardhan, M Arif… - Wireless …, 2022 - Wiley Online Library
The technology grows quickly in the area of the VLSI physical design; it is crucial to integrate
the greater number of transistors and parts into a very small range. Before the placement is …

[HTML][HTML] An optimal method for identification of finger vein using supervised learning

S Shakil, D Arora, T Zaidi - Measurement: Sensors, 2023 - Elsevier
The identification of finger vein is very advanced biometric technique and also behove an
important discipline in biometric area, accommodating growing attention in last years. In the …

Facial skincare products' recommendation with computer vision technologies

TY Lin, HT Chan, CH Hsia, CF Lai - Electronics, 2022 - mdpi.com
Acne is a skin issue that plagues many young people and adults. Even if it is cured, it leaves
acne spots or acne scars, which drives many individuals to use skincare products or …

Fingerprint liveness detection approaches: a survey

M Chen, C Yuan, Y Lv - International Journal of …, 2023 - inderscienceonline.com
In contemporary society, with the popularity of smart wearable devices, people are more
inclined to use convenient and efficient identity verification based on biometrics. Human …