An accurate method to obtain bio-metric measurements for three dimensional skull
The goal of this study is to investigate and evaluate how far three-dimensional skull biometric is reliable in term of the accurate measurements, capability and applicability. It was hard to evaluate or simulate an application use three-dimensional skull in biometric, however, can field imaging syst...
| Main Authors: | Hameed, Shihab A., Zaidan, B. B., Zaidan, A. A., Naji, Ahmed Wathik, Tawfiq, O. F. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/6393/ http://irep.iium.edu.my/6393/1/An_Accurate_Method_to_Obtain_Bio-Metric_Measurements_for_Three_Dimensional_Skull.pdf |
Similar Items
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Sinonasal hybrid tumour involving the anterior skull base
by: Mazita, A, et al.
Published: (2008)
by: Mazita, A, et al.
Published: (2008)
Skull study
by: Costantino, Thea
Published: (2013)
by: Costantino, Thea
Published: (2013)
Sigmund Freud's Skull
by: Costantino, Thea
Published: (2013)
by: Costantino, Thea
Published: (2013)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
An overview: laser applications in dentistry
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
Three dimensional biometric guide in determining maxillary tooth position and arch form / Omar Farouq Tawfiq
by: Omar Farouq, Tawfiq
Published: (2020)
by: Omar Farouq, Tawfiq
Published: (2020)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Fractal coding of bio-metric image for face authentication
by: Ahadullah, Md
Published: (2021)
by: Ahadullah, Md
Published: (2021)
Technical nuances of commonly used vascularised flaps for skull base reconstruction
by: I P, Tang, et al.
Published: (2015)
by: I P, Tang, et al.
Published: (2015)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
Geometrical measurements in three-dimensional quantum gravity
by: Barrett, John W.
Published: (2002)
by: Barrett, John W.
Published: (2002)
Three-dimensional craniofacial surface measurement
techniques
by: Tan, Shuen Chuan, et al.
Published: (2005)
by: Tan, Shuen Chuan, et al.
Published: (2005)
Three-dimensional inkjet printing of electrically active materials
by: Nelson-Dummett, O.B.
Published: (2025)
by: Nelson-Dummett, O.B.
Published: (2025)
Three dimensional formalism of the measurement equation for wide field polarimetric imaging
by: Smith, D., et al.
Published: (2015)
by: Smith, D., et al.
Published: (2015)
Prototype development of normal Asian human skull
by: Nurhanis Sofiah, Abd Ghafar
Published: (2013)
by: Nurhanis Sofiah, Abd Ghafar
Published: (2013)
Toward Efficient Low Cost Highly Accurate Emotion Speech Synthesizer,
by: Mahmood, Ahmed Mustafa, et al.
Published: (2008)
by: Mahmood, Ahmed Mustafa, et al.
Published: (2008)
Experts measuring temperature by hand not accurate
by: Tang, Ashley
Published: (2020)
by: Tang, Ashley
Published: (2020)
Personalized three-dimensional printed coronary artery models for accurate assessment of coronary stenosis using high resolution imaging modality
by: Sun, Zhonghua
Published: (2019)
by: Sun, Zhonghua
Published: (2019)
Real time power control strategy for output power for single phase inverter-linear load
by: Zaidan, Ahmed Naji
Published: (2019)
by: Zaidan, Ahmed Naji
Published: (2019)
Radiology self-learning module for students (skull and brain)
by: Hassan, Radhiana
Published: (2016)
by: Hassan, Radhiana
Published: (2016)
A novel theoretical analysis of quadruple pass Erbium doped
fiber amplifier
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Three-dimensional Analysis of Creep Voids
by: Wahab, A.A., et al.
Published: (2005)
by: Wahab, A.A., et al.
Published: (2005)
CCCI metrics for the measurement of quality of e-service
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Performance measures and metrics for e‐supply chains
by: Sambasivan, Murali, et al.
Published: (2009)
by: Sambasivan, Murali, et al.
Published: (2009)
Image noise severity metric
by: Bong, D.B.L, et al.
Published: (2012)
by: Bong, D.B.L, et al.
Published: (2012)
Design and Development of Three-dimensional Laser Roughness Measurement Apparatus
by: Sharifzadeh, Mostafa, et al.
Published: (2012)
by: Sharifzadeh, Mostafa, et al.
Published: (2012)
Gelatins from three cultured freshwater fish skins obtained by liming process
by: Bakar, Jamilah, et al.
Published: (2011)
by: Bakar, Jamilah, et al.
Published: (2011)
Power usage effectiveness metrics to measure efficiency and performance of data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Complexity metrics for measuring the understandability and maintainability of Business Process Models using Goal-Question-Metric (GQM)
by: Abd Ghani, Abdul Azim, et al.
Published: (2008)
by: Abd Ghani, Abdul Azim, et al.
Published: (2008)
Inflammatory pseudotumour of skull base – Diagnostic
challenge and treatment outcome
by: Abdullah, Kahairi, et al.
Published: (2012)
by: Abdullah, Kahairi, et al.
Published: (2012)
The trapezius myocutaneous flap for reconstruction of latreral skull base defects
by: Raja Lope Ahmad, Raja Ahmad Al'konee, et al.
Published: (2005)
by: Raja Lope Ahmad, Raja Ahmad Al'konee, et al.
Published: (2005)
Similar Items
-
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009) -
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)