Essays about: "Fingerprint Recognition"
Showing result 1 - 5 of 25 essays containing the words Fingerprint Recognition.
-
1. Contactless palm print recognition: Novel design and palm openness classification
University essay from Lunds universitet/Matematik LTHAbstract : Biometric technologies, such as facial and fingerprint recognition, have become widely adopted for identity verification in various applications. Palm biometrics, utilizing the unique patterns of the human palm, has gained significant attention for its accuracy and security. READ MORE
-
2. Phone Free Study : Encouraging students to put away their phones
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : Many of us have grown up or have been acquainted with individuals who have grown up with smartphones in educational settings. We are well aware of how disruptive they can be, and I myself am not an exception. READ MORE
-
3. Polar Codes for Biometric Identification Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE
-
4. Speaker Recognition using Biology-Inspired Feature Extraction
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Distinguishing between people's voices is something the human brain does naturally, using only frequencies picked up by the inner ear. The field of speaker recognition is concerned with making machines do the same thing using digitally sampled speech and data processing. READ MORE
-
5. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor
University essay fromAbstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE