Fingerprint biometric based access control and classroom attendance management system

Y Mittal, A Varshney, P Aggarwal… - 2015 Annual IEEE …, 2015 - ieeexplore.ieee.org
Fingerprint is a reliable biometric feature having a wide range of applications that require
authentication. Person-specific verification is needed in many scenarios such as access …

[PDF][PDF] Improving mobile money security with two-factor authentication

AB Mtaho - International Journal of Computer Applications, 2015 - Citeseer
Security is a leading factor for establishing and maintaining customer trust in mobile money
services (MMSs). MMSs in Tanzania rely on the use of Personal Identification Number (PIN) …

Human identification by oral prosthesis analysis with probability rates higher than DNA analysis

LDM Modesti, GM Vieira, MF Galvão… - Journal of Forensic …, 2014 - Wiley Online Library
Several techniques are used to perform an appropriate and reliable human identification.
Forensic dentistry has achieved great relevance over the past years. The aim of this article is …

[PDF][PDF] A gender and ethnicity identification system in Nigeria using the fingerprint technology

S Orike, VIE Anireh, SI Ademuyiwa - Proceedings of the World Congress …, 2016 - iaeng.org
Identification in Nigeria and indeed many other developing nations is still lagging behind in
terms of individuality, as the conventional ways currently in use (driver's license …

[PDF][PDF] The Adoption of Biometric Fingerprint Timekeeping Technology in the Ghanaian Business Community-Effectiveness and Impact

J Ami-Narh, LK Aziale, A Akanferi - International Journal of Computer …, 2014 - Citeseer
Timekeeping mechanisms are relevant to organisational productivity. Moreover, biometric
timekeeping methods are more robust and provide access to enhanced systems of …

[PDF][PDF] An Enhanced Minitiae-based Fingerprint Matching Algorithm

OG Aju, SM Orimoloye… - International Journal of …, 2018 - researchgate.net
Fingerprint authentication has been considered as the most complex and the matchlessly
the most unchangeable form of all the biometric techniques, a procedure that has been …

Integrated identity and access management system for tertiary institutions in developing countries

BU Stephen, GA Chukwudebe, CP Ezenkwu - Nigerian Journal of …, 2015 - ajol.info
Issuance of disparate identifiers to students, manual method of student identity management
and access control and the unavailability of actionable information on pattern of students' …

[HTML][HTML] Industrial safety door: Conceptual design and analysis

MS Rusdi, SN Khalil, S Mat… - … Research Day 2018, 2018 - books.google.com
Creating a reliable and robust security system has become one of the main concerns of the
global community in this modernization era which is congested with threats. In industrial …

[PDF][PDF] Advanced Fingerprinting Based Access Control System for Smart Industries and Buildings with IoT

V SWARUPA, M MERCY - 2017 - ijatir.org
Area benefit is one of the essential administrations in brilliant mechanized frameworks of
Internet of Things (IoT). For different area based administrations, exact confinement has …

Biometric Authentication A Case For The Nairobi Securities Exchange

PK Rureri - 2013 - erepository.uonbi.ac.ke
There has been a sharp increase in fraud activities in various organizations in Kenya such
as banks and stock brokerage firms. This has been happening mostly due to poor …