In general, data traffic volume is significant in sensor networks, and communication often occurs with variable capacity during early forest fire detection using Wireless Sensor Networks (WSN). Initially, optimal rout...
详细信息
The escalating prevalence of violent threats necessitates proactive security measures to safeguard human life. Within the realm of artificial intelligence (AI), computer vision has emerged as a pivotal tool, leveragin...
详细信息
This study explores the application of deep learning models for the detection of lung cancer subtypes utilizing histopathological images. Leveraging a diverse dataset containing images of adenocarcinoma, squamous cell...
详细信息
Agricultural industry has grown significantly bring sustainable farming practices in improving the food quality, enhancing agricultural productivity and global food security. However, the crop yield and its quality ar...
详细信息
Federated learning (FL) offers a decentralized approach to training machine learning models, allowing data to remain on local devices and preserving privacy. However, the decentralized nature of F Lintroduces challeng...
详细信息
Facial Attendance Tracker is a mobile application where a student can fetch his/her attendance by scanning his/her face from his/her own mobile. The faculty will project the Dynamic QR code when he/she wants to take t...
详细信息
Classical machine learning has practical significant advancements and extensive acceptance across various domains, enabling the growth of precise predictive models. The purpose of this work is to examine the accuracy ...
详细信息
In human perceptive, Augmented Reality (AR) or Virtual Reality(VR) is an effective and deep technology because it creates new replicated world. The AR or VR technique is a distinctive and lucrative application;its imm...
详细信息
In this constructive healthcare industry, AI-based IOMT (Internet of Medical Things) is one of the highly used Technologies. The virtual world is customary to lose responsible data in cyberspace. Without any doubt, IO...
详细信息
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip...
详细信息
ISBN:
(纸本)9798350328202
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to principally uphold the confirmation framework. Notwithstanding foundations regulating guaranteed about information straightforwardly, affiliations are also obliging them to examine the fingerprint endorsement. Despite establishments overseeing ensured about data, directly associations are similarly obliging them to research the fingerprint check. Organizations and foundations both are typically utilizing the idea of fingerprint for the participation and presence reason. Nevertheless, establishments presently managing secured information as like institutes and additionally going along with them to investigate the fingerprint authentication. More than this usual action there are some particular applications where the authentication would be considerable to help the application than using a traditional pattern of password. We proposed a fingerprint authentication system for the scientific based industry database access system. We removed the noise if any found in the input fingerprint using anisotropic Gauss filtering. The noise free fingerprint image is not further passed to the binarization phase as the need of binarization and some form of the drawback of binarization is replaced with a thinning algorithm. The thinned fingerprint image is followed by the matching process and once it is matched, then only the sensitive and highly confidential information are allowed to access from the database. The testing is done using OpenCV and FVC 2004 dataset to assess the projected retrieval method. Further the matched fingerprints are used to prove some of the internal structure properties of multi-granular rough sets (MGRS) on authenticated database fields. The accuracy obtained in this hybrid approach is found to be more satisfactory and hence the security towards acce
暂无评论