2021
DOI: 10.1109/access.2021.3057931
|View full text |Cite
|
Sign up to set email alerts
|

FESD: An Approach for Biometric Human Footprint Matching Using Fuzzy Ensemble Learning

Abstract: Biometric traits such as fingerprint, retina scan, and palm-prints are used to identify a person at attendance monitoring, banking, passport, travel, and many other applications. Biometric-based person identification is the only method that never changes according to time, and no one can copy it without knowledge. Footprint-based biometric is one way to recognize a person based on different features associated with human footprints. For example, some places, such as airports, nanotechnology laboratories, silic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 37 publications
0
18
0
Order By: Relevance
“…Because we are dealing with log files, we do not have such ambiguities and the design becomes straightforward. Stemming and lemmatization methods shall be used to convert the complex server/system logs into structured [27,28]. Collecting log files from a server/system can either be done by Linux-based systems like Syslog and Logcat or by manually logging system activities.…”
Section: Methodsmentioning
confidence: 99%
“…Because we are dealing with log files, we do not have such ambiguities and the design becomes straightforward. Stemming and lemmatization methods shall be used to convert the complex server/system logs into structured [27,28]. Collecting log files from a server/system can either be done by Linux-based systems like Syslog and Logcat or by manually logging system activities.…”
Section: Methodsmentioning
confidence: 99%
“…This arrangement guarantees that only approved users will have access to the EMR. In [25], the authors suggest that the three key necessities for EPR data whacking and diffusing the repossession of the EPR should be due to the absence of the covers image, zero "Bit Error Rate" (BER) is required for EPR data and imperceptibility should not be showing for any reason. For additional privacy, encryption of the patient data can also be used for watermarking.…”
Section: Summary Of Related Workmentioning
confidence: 99%
“…The blocks have predefined functional logic written into them to handle and propagate data as per our requirement. Blockchain technology is used as a middleware for integration of IoT devices with added features such as better data retrieval, data security, and data propagation [36]. Each block shall have data from a separate refrigerator feature; when the machine learning model requires a particular data, the system shall call for it using predefined functions.…”
Section: Blynk Applicationmentioning
confidence: 99%