Novel simulation framework of three-dimensional skull bio-metric measurement
Previously, most of the researcher was suffering from simulate any three dimension applications for biometrics application, likewise, various applications of forensics and cosmetology has not been easy to be simulated. Three dimensional figures have approved the fact that, it has been more reliable...
| Main Authors: | Hameed, Shihab A., Zaidan, B.B., Zaidan, A.A., Naji, Ahmed Wathik, Faroq, Omar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Engg Journals Publications
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1039/ http://irep.iium.edu.my/1039/1/Novel_Simulation_Framework_of_Three-Dimensional_Skull_Bio-Metric_Measurement.pdf |
Similar Items
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Queue backlog as a node metric for RPL protocol
by: Abdullah M. A, Awad, et al.
Published: (2016)
by: Abdullah M. A, Awad, et al.
Published: (2016)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel MEMS fully differential capacitive transducer design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Cluster-based multi-hop vehicular communication with multi-metric optimization
by: Alawi, Mahmoud, et al.
Published: (2012)
by: Alawi, Mahmoud, et al.
Published: (2012)
Toward strategic green ICT policy to eliminate environmental problems
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
A novel bio-inspired routing algorithm based on ACO for WSNs
by: Sharmin, Afsah, et al.
Published: (2019)
by: Sharmin, Afsah, et al.
Published: (2019)
Sinonasal hybrid tumour involving the anterior skull base
by: Mazita, A, et al.
Published: (2008)
by: Mazita, A, et al.
Published: (2008)
A computer based simulator for Erbium-Doped Fiber Amplifier
by: Naji, Ahmed Wathik, et al.
Published: (2010)
by: Naji, Ahmed Wathik, et al.
Published: (2010)
Skull study
by: Costantino, Thea
Published: (2013)
by: Costantino, Thea
Published: (2013)
Novel multi-perspective usability evaluation framework for selection of open source software based on BWM and group VIKOR techniques
by: Dawood, Kareem A., et al.
Published: (2021)
by: Dawood, Kareem A., et al.
Published: (2021)
A novel theoretical analysis of quadruple pass Erbium doped
fiber amplifier
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
RARE: mining colossal closed itemset in high dimensional data
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
The effect of network’s size on the performance of the gateway discovery and selection scheme for MANEMO
by: Mahmod, Zainab S., et al.
Published: (2017)
by: Mahmod, Zainab S., et al.
Published: (2017)
Toward mobility-based surveillance model for static multi-targets
by: Hameed, Shihab A.
Published: (2015)
by: Hameed, Shihab A.
Published: (2015)
Three-dimensional Analysis of Creep Voids
by: Wahab, A.A., et al.
Published: (2005)
by: Wahab, A.A., et al.
Published: (2005)
Sigmund Freud's Skull
by: Costantino, Thea
Published: (2013)
by: Costantino, Thea
Published: (2013)
A low-cost first-order sigma-delta converter design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019)
by: Zulkurnain, Nurul Fariza
Published: (2019)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
An overview: laser applications in dentistry
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
The effect of network’s size on the performance of the gGateway discovery and selection scheme for MANEMO
by: Zainab S., Mahmod, et al.
Published: (2017)
by: Zainab S., Mahmod, et al.
Published: (2017)
A novel approach to stuttered speech correction
by: Ajibola, Alim Sabur, et al.
Published: (2016)
by: Ajibola, Alim Sabur, et al.
Published: (2016)
On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: an automated anti-pornography system
by: Zaidan , A. A., et al.
Published: (2014)
by: Zaidan , A. A., et al.
Published: (2014)
Trench DMOS interface trap characterization by three-terminal charge pumping measurement
by: Izzudin , Ismah, et al.
Published: (2012)
by: Izzudin , Ismah, et al.
Published: (2012)
Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2022)
by: Qahtan, Sarah, et al.
Published: (2022)
Dust-storm induced cross-polarization at MMW dands in Northern Nigeria
by: Musa, A.A, et al.
Published: (2012)
by: Musa, A.A, et al.
Published: (2012)
A calibration framework for swarming ASVs' system design
by: Zainal Abidin, Zulkifli
Published: (2012)
by: Zainal Abidin, Zulkifli
Published: (2012)
An Investigation of Femtocell Network Synchronization
by: Hasan, Mohammad Kamrul, et al.
Published: (2011)
by: Hasan, Mohammad Kamrul, et al.
Published: (2011)
Novel Three Dimensional Bandpassing Block Filters
by: Khoo, Choon Shen
Published: (2012)
by: Khoo, Choon Shen
Published: (2012)
Similar Items
-
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)