2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS) 2020
DOI: 10.1109/iciccs48265.2020.9120896
|View full text |Cite
|
Sign up to set email alerts
|

Automated Biometric Personal Identification-Techniques and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…In this manner installing crop development models (CGMs) into the Internet of Things application framework would make the agribusiness framework increasingly astute and versatile. We can accumulate constant information dependent on conditions that exist, utilizing remote innovation, for example, sensors, so Agriculturalists can take activities quickly (15). They can settle on very much established choices for their yields dependent on climate conditions, dampness and stickiness, compound pieces of the dirt.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this manner installing crop development models (CGMs) into the Internet of Things application framework would make the agribusiness framework increasingly astute and versatile. We can accumulate constant information dependent on conditions that exist, utilizing remote innovation, for example, sensors, so Agriculturalists can take activities quickly (15). They can settle on very much established choices for their yields dependent on climate conditions, dampness and stickiness, compound pieces of the dirt.…”
Section: Related Workmentioning
confidence: 99%
“…Internet of things can be depicted upon for Information and Communication Technology as an extravagant term for a situation where anything might be embedded in a system, be particularly recognized, and interface with insignificant human intercession. These things can have a place with this present reality both from lifeless pieces and to living creatures, or the virtual world (virtual "things") that solitary exists in a re-enactment domain (2). To explain, a thing is a customary gadget that can be extraordinarily recognized and associated with the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…Where, c1 and c2 are included to avoid instability when Β΅ π‘₯ 2 + Β΅ 𝑦 2 𝑖𝑠 π‘£π‘’π‘Ÿπ‘¦ π‘ π‘šπ‘Žπ‘™π‘™ π‘Žπ‘›π‘‘ π‘π‘™π‘œπ‘ π‘’ π‘‘π‘œ π‘§π‘’π‘Ÿπ‘œ. c1 and c2 are given as: 𝑐 1 = (𝐾 1 𝐿) 2 where 𝐾 1 = 0.01; 𝑐 2 = (𝐾 2 𝐿) 2 π‘€β„Žπ‘’π‘Ÿπ‘’ 𝐾 2 = 0.03; L = dynamic range of the pixel values.…”
Section: 𝑆𝑆𝐼𝑀(π‘₯ 𝑦) =mentioning
confidence: 99%
“…Among all the biometrics, fingerprints are the most reliable and useful biometrics system [1]. In the paper, [2] authors commented that fingerprint-based biometric system is less expensive as compared to face and iris-based systems. In the past, many researchers commented on applications of fingerprints and their usability but it laid down in its objective due to presentation attacks [3].…”
Section: Introductionmentioning
confidence: 99%
“…Various biometric features can be used for this purpose, with each offering unique information for identification. The most common biometric features employed for recognition include fingerprint scanning, iris recognition, and face recognition [ 1 ]. However, all these biometric features require close contact with the subject, which is impossible in some scenarios.…”
Section: Introductionmentioning
confidence: 99%