Introduction to fingerprint verification
Fingerprint biometric is one of the essential, widely used and accepted biometrics. It has been used as a form of identification for a long time and considers an acceptance and fear. Fingerprints consider by people as unique and can be used to identify someone. This trust comes from governmental and...
| Main Authors: | Hameed, Shihab A., Badurik, Waleed A. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21666/ http://irep.iium.edu.my/21666/1/Chapter_33.pdf |
Similar Items
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to multicast mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Mitigation of multipath fading in indoor radiometric fingerprinting systems
by: Agel, Mabruka Mohamed, et al.
Published: (2019)
by: Agel, Mabruka Mohamed, et al.
Published: (2019)
Harmful data that affect ethical, religious, and social values of Internet users in education process
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Computer and electronic devices waste: analytical study
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Enhancement of voip and video streaming performance over IEEE802.11e WLAN
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to intelligent video surveillance system
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Overview on fingerprinting authentication technology
by: Sulaiman, Nadzril, et al.
Published: (2020)
by: Sulaiman, Nadzril, et al.
Published: (2020)
Application of mobile cloud computing in emergency health care
by: Hameed, Shihab A., et al.
Published: (2019)
by: Hameed, Shihab A., et al.
Published: (2019)
Current trend in Image Guided Surgery(IGS)
by: Aboaba, Abdulfattah A., et al.
Published: (2011)
by: Aboaba, Abdulfattah A., et al.
Published: (2011)
QOS multicast routing in MANETs
by: Qabajeh, Mohammad, et al.
Published: (2011)
by: Qabajeh, Mohammad, et al.
Published: (2011)
Transducers-to-microcntroller interfaces-software solution approach
by: Adetunji, Lawal Wahab, et al.
Published: (2011)
by: Adetunji, Lawal Wahab, et al.
Published: (2011)
Fast UWB wireless connectivity for MIMO multi-user
by: Mohammed, Ahmed R., et al.
Published: (2013)
by: Mohammed, Ahmed R., et al.
Published: (2013)
Design and implementation of an optimal fuzzy logic controller using egentic algorithm
by: Abdulazeez, Salami Femi, et al.
Published: (2011)
by: Abdulazeez, Salami Femi, et al.
Published: (2011)
E-waste : problems, Islamic perspective and solutions
by: Faris, Waleed Fekry, et al.
Published: (2011)
by: Faris, Waleed Fekry, et al.
Published: (2011)
Micro-Mechanical Bending (M2
B) method for
Carbon Nanotube (CNT) based sensor fabrication
by: Mohd Razib, M. A., et al.
Published: (2014)
by: Mohd Razib, M. A., et al.
Published: (2014)
Comparison of empirical propagation path loss models for mobile communications in the suburban area of Kuala Lumpur
by: Chebil, Jalel, et al.
Published: (2011)
by: Chebil, Jalel, et al.
Published: (2011)
Human posture recognition : literature review
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Transmission power consumption management for zigbee healthnets
by: Habaebi, Mohamed Hadi, et al.
Published: (2011)
by: Habaebi, Mohamed Hadi, et al.
Published: (2011)
2.45 Ghz passive RFID tag antenna mounting on various platforms
by: Yussuf, Abubeker A., et al.
Published: (2011)
by: Yussuf, Abubeker A., et al.
Published: (2011)
Wall Climbing Robot: Mechanical Design and
Implementation
by: Albagul, Abdulgani, et al.
Published: (2011)
by: Albagul, Abdulgani, et al.
Published: (2011)
Simulation analysis for maximizing renewable solar energy to improve the power generation capacity in the state of Kuwait
by: Muhaisen, Naser, et al.
Published: (2018)
by: Muhaisen, Naser, et al.
Published: (2018)
Modelling and simulation of 1.2 MWp tenaga suria brunei photovoltaic power plant
by: Qayyum, Md, et al.
Published: (2020)
by: Qayyum, Md, et al.
Published: (2020)
Wireless connectivity of PC peripherals using ultrawide band pulses
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
A cost and delay estimation of a suite of low-cost adaptive routers for hierarchical torus network
by: Rahman, M.M. Hafizur, et al.
Published: (2012)
by: Rahman, M.M. Hafizur, et al.
Published: (2012)
Application of UWB wireless MIMO connectivity inside modern aircraft
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2016)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2016)
Modelling of electronics heat sink – influence of the wake function generation on the accuracy of CFD analysis
by: Ahmed, Mirghani Ishak, et al.
Published: (2011)
by: Ahmed, Mirghani Ishak, et al.
Published: (2011)
UWB pulse generation,shaping and analysis
by: Shahid, Zeeshan, et al.
Published: (2011)
by: Shahid, Zeeshan, et al.
Published: (2011)
Speech coding techniques and algorithms
by: A.Kassim, Liban, et al.
Published: (2011)
by: A.Kassim, Liban, et al.
Published: (2011)
Real-time human detection for video surveillance
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
English digits speech recognition system based on hidden Markov Models
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Convolutional neural network training with artificial pattern for Bangla handwritten numeral recognition
by: Akhand, M. A. H, et al.
Published: (2016)
by: Akhand, M. A. H, et al.
Published: (2016)
Handwritten Bangla numeral recognition using deep long short term memory
by: Ahmed, Mahtab, et al.
Published: (2017)
by: Ahmed, Mahtab, et al.
Published: (2017)
Decision tree ensemble construction incorporating feature values modification and random subspace method
by: Akhand, M. A. H, et al.
Published: (2014)
by: Akhand, M. A. H, et al.
Published: (2014)
Application and case studies of magnetic induction
by: Arshad, Atika, et al.
Published: (2011)
by: Arshad, Atika, et al.
Published: (2011)
Magnetic hysteresis theory :application perspective
by: Arshad, Atika, et al.
Published: (2011)
by: Arshad, Atika, et al.
Published: (2011)
The principle of resistive sensing
by: Arshad, Atika, et al.
Published: (2011)
by: Arshad, Atika, et al.
Published: (2011)
Interactive voice response technology for telephony system
by: Abu Shariah, Mohammad A. M., et al.
Published: (2011)
by: Abu Shariah, Mohammad A. M., et al.
Published: (2011)
Inductive power system for energy harvesting
by: Arshad, Atika, et al.
Published: (2011)
by: Arshad, Atika, et al.
Published: (2011)
RC circuit response
by: Arshad, Atika, et al.
Published: (2011)
by: Arshad, Atika, et al.
Published: (2011)
Similar Items
-
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011) -
Introduction to multicast mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011) -
Mitigation of multipath fading in indoor radiometric fingerprinting systems
by: Agel, Mabruka Mohamed, et al.
Published: (2019) -
Harmful data that affect ethical, religious, and social values of Internet users in education process
by: Hameed, Shihab A.
Published: (2011) -
Computer and electronic devices waste: analytical study
by: Hameed, Shihab A., et al.
Published: (2011)