A Close Approach to Iris Recognition System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Iris recognition, a relatively new biometric technology, has great advantages such as variability, stability and security, thus it is the most promising for high security environments. Among its applications are border control in airports and harbors, access control in laboratories and factories, identification for Automatic Teller Machines and restricted access to police evidence rooms. There have been several implementations of security systems using biometric, especially for identification and verification cases. The term “biometrics” isderived from the Greek words bio (life) and metric (to measure). The pattern used in the biometric is the iris pattern in human eye. The iris pattern has been proved unique for each person. A literature review of the most prominent algorithms implemented in each stage is presented. This paper provides a review of major iris recognition researches.
Authors and Affiliations
Deepika Prashar
Privacy Protection in Personalized Web Search Via TaxonomyStructure
Abstract: Web search engine has long become the most important portal for ordinary people looking foruseful information on the web. User might experience failure when search engine return irrelevanceinformation due to en...
Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation
In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout i...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-Navigation System
Abstract: This paper presents an implementation of the Hough transform for detecting straight lines within rectilinear environments for further processing towards automatic recognition of a path by a mobile robot for the...
Challenges and Issues of Cluster Based Security in MANET
Abstract: Mobile ad-hoc networks are a specific kind of wireless networks that can be quickly deployed without pre- existing infrastructures. Even though there are various studies on cluster based security in MANET but t...
Leveraging Map Reduce With Hadoop for Weather DataAnalytics
Abstract : Collecting, storing and processing of huge amounts of climatic data is necessary for accurateprediction of weather. Meteorological departments use different types of sensors such as temperature, humidity...