Proposed Approach for Iris Recognition in Security Based Applications

Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 2

Abstract

Proposed Approach for Iris Recognition in Security Based Applications

Authors and Affiliations

Keywords

Related Articles

Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems

In past few years, Web has huge impact on distributed computing. The provisioning of fundamental security mechanisms like authentication and confidentiality for Sender/Receiver System is exceptionally difficult. Authenti...

Fractal Color Image Compression Using YPbPr and YUV Color Spaces By Zero-Mean Method

In this work , two type of the color space ware used , it is ( YPbPr , YUV ), and Lena color image were used , to test the pest PSNR, CR, ET, by used the fractal image compression by Zero-Mean method. In (YPbPr )color s...

Barriers To, and Facilitators of, Research Utilization among Nurses Working in Taif Hospitals, Saudi Arabia

"Background: Research utilization in nursing has been a prominent concern for more than 20 years. Previous literature showed several factors impede or facilitate nurses to utilize research findings. Those factors mainly...

Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools

"The growth in Information Technology has led to the transformation of the banking system towards providing efficient services while simultaneously being time and cost effective. This led to the introduction of the cashl...

An Energy Aware Routing Protocol with Sleep Scheduling for WSN

Wireless Sensor Networks (WSNs) consist of a large number of small and low cost sensor nodes powered by small batteries and equipped with various sensing devices. Usually, for many applications, once a WSN is deployed, p...

Download PDF file
  • EP ID EP334541
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

(2013). Proposed Approach for Iris Recognition in Security Based Applications. International Journal of Science and Research (IJSR), 2(2), -. https://europub.co.uk/articles/-A-334541