Trends towards 3d Fingerprint Recognition: A Comparative Study
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
The essentially the most popular utilized biometrics, fingerprint may be considered for higher than a century. Many effective Fingerprint Recognition techniques usually are proposed while using the rapid progress of fingerprint acquires devices along with the advent associated with countless innovative algorithms. However, they will often be almost based on 2D fingerprint characteristics, even the reality this specific human ring finger is 3D images target. This report has presented an evaluation on different 2D in addition to 3D ring finger recognition methods. The review has revealed that the application of 3D fingerprint acceptance is dismissed in most existing investigation. There usually are distortions in addition to deformations released and three dimensional information missing when second fingerprint images are utilized, which are unable to perfectly connect with people's needs in exactness and computational difficulty. The general objective of the paper is usually to explore different limitations in existing methods.
Authors and Affiliations
Gurween Kaur, Shikha Chawla
slugModelling and Performance Evaluation of Square Wave And Spwm Based Inverter Fed AC Drive
The controlling of AC motor is handled by a AC drive. This paper is versatile and standalone system and most of the facilities to interface with PC is implemented. The paper involves the speed control of three phase ind...
Efficient Heuristics for Flow Shop Scheduling with make span Optimization Criteria
In modern manufacturing environment the trend is the development of Computer Integrated Manufacturing (CIM) technologies which is computerized integration of manufacturing activities (design, planning, sequencing, sched...
Defeating DOS Attacks in Low Rate Networks Using Network Multifractal
Nowadays, distributed denial of service (DDoS) attacks pose one of the most serious security threats to the Internet. DDoS attacks can result in a great damage to the network service. To have a better understanding on D...
An Efficient Way of Broadcasting Response Message to Help Demanding Vehicle in VANET
VANET is very demanding area of research in these days. In this paper, we identify that when an emergency condition occurred at any location on the road, then emergency support take time to reach emergency location due...
Simulation Based Performance in Terms of Node Energy for Different Proactive and Reactive Routing Protocols of MANET
Mobile Ad hoc network always has a challenge of curbing nodes energy during transmission and in other modes as nodes in the network runs with limited battery power which ultimately plays a keen role during entire transm...