Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 22 of 22
1. Title: Biometric user authentication for IT security : from fundamentals to handwriting / by Claus Vielhauer.
Advances in information security.
Author: Vielhauer, Claus.
Publication: Springer, New York : 2005.
2. Title: Handbook of Biometrics / edited by Anil K. Jain,Patrick Flynn, Arun A. Ross.
Publication: Springer, New York : 2008.
3. Title: Biometric systems : technology, design, and performance evaluation / James Wayman ... [et al.] (eds.).
Publication: Springer, London : cop. 2010.
4. Title: Biometric person recognition : face, speech and fusion / Conrad Sanderson.
Author: Sanderson, Conrad.
Publication: VDM Verlag Dr. Mèuller, Saarbrèucken, Germany : 2008.
5. Title: New directions in behavioral biometrics / Khalid Saeed ; with Marcin Adamski, Tapalina Bhattasali, Mohammad K. Nammous, Piotr Panasiuk, Mariusz Rybnik, and Soharab H. Shaikh.
Author: Saeed, Khalid (Computer scientist),
Publication: CRC Press, Taylor & Francis Group, Boca Raton, FL : [2017]
6. Title: Text-independent gender-dependent speaker recognition system [electronic resource]/ by el Hajj Malek ; Raja Faddoul ; supervised by Chafic Mokbel.
CD-ROM;
Author: El Hajj, Malek.
Publication: 2003.
7. Title: Biometrics / John D. Woodward, Nicholas M. Orlans, Peter T. Higgins.
Biometrics: identity assurance in the information age
Identity assurance in the information age: biometrics
Author: Woodward, John D., Jr.
Publication: McGraw-Hill/Osborne, New York : c2003.
8. Title: Biometric authentication : a machine learning approach / S.Y. Kung, M.W. Mak, S.H. Lin.
Prentice Hall information and system scineces series.
Author: Kung, S. Y. (Sun Yuan)
Publication: Prentice Hall Professional Technical Reference, Upper Saddle River, NJ : 2005.
9. Title: An evaluation model for human iris recognition systems / by Samar Yousef al-Saqqa ; supervised by Mohammad al-Rawi, co-supervisor Mohammad al-Zoubi.
نموذج لتقييم تقنيات التعرف على قزحية العين البشرية.
Author: al-Saqqa, Samar Yousef.
Publication: 2007.
10. Title: Efficient iris recognition using reduced iris code method / by Nidaa Hasan al-Omari ; supervised by Abedel Latif abu Dalhoum.
الاسترجاع الفعال لقزحية العين باستخدام ترميز القزحية المختزل
Author: al-Umari, Nida Hasan Salih.
Publication: 2009.
11. Title: Classification of cultures for Jordan tourists using intelligent image analysis / by Dina A. Abdul-Jawad ; supervised by Raja' S. alOmari, co-supervisor Hazem Hiary.
تصنيف ثقافات السياح في الأردن باستخدام التحليل الذكي للصور
Author: Abd al-Jawad, Dina Ali.
Publication: 2013.
12. Title: Efficient biometric indexing and retrieval techniques for large-scale systems / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati.
SpringerBriefs in computer science
SpringerBriefs in Computer Science.
Author: Kavati, Ilaiah,
Publication: Springer-Verlag, Cham : 2017.
13. Title: Machine learning for user authentication using keystroke dynamics / by Ahmad Ayman al-Tarawneh ; supervised by Dr. Mouhammd al-Kasassbeh.
استخدام ديناميات المفاتيح في تعليم الآلة من أجل مصادقة المستخدم
Author: al-Tarawneh, Ahmad Ayman,
Publication: 2015.
14. Title: Investigating Hilbert and linear predictive coding transformations for biometric base watermark / by Haifa'a Sulaiman Abu-Zaghlan ; supervised by Ahmad Sharieh, co-supervisor Moussa Habib.
دراسة العلامة المائية البيوقياسية باستخدام مجالي هيلبرت و التشفير التوقعي الخطي.
Author: Abu-Zaghlan, Haifa'a Sulaiman.
Publication: 2006.
15. Title: Protecting and prying.
Author: Open University T215/Block 4.
Publication: Open University, Milton Keynes : 2012.
Edition: 2nd ed.
16. Title: Efficient biometric indexing and retrieval techniques for large-scale systems / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati.
SpringerBriefs in computer science
SpringerBriefs in Computer Science.
Author: Kavati, Ilaiah.
Publication: SPRINGER, Cham : 2017.
17. Title: Improvement of Iris recognition system using fuzzy segmentation and neural network / by Kawther Hamadala al-Hawamda ; supervised by Adnan al-Smadi, co-supervisor Esam al-Dawood.
تطوير نظام التعرف على هوية الأشخاص بواسطة قزحية العين بإستخدام تقنية الأنقسام الضبابي والشبكات العصبونية
Author: al-Hawamidah, Kawthar Hamd Allah Muhammad.
Publication: 2010.
18. Title: Intelligent Tracking in Closed Areas Using Deep Learning System by Mohammad Alkhalef ; Advisor Dr. Abed Al Raoof K. Bsoul, Co-Supervised Dr.Moy'awiah A. Al-Shannaq.
التعقب الذكي في المناطق المغلقة بإستخدام نظام التعلم العميق
Author: Alkhalefi, Mohammad,
Publication: Yarmouk University, Irbid, Jordan : 2021.
19. Title: An enhanced classifier for authentication in keystroke dynamics using experimental data / by Abdullah Osamah al-Rahmani ; supervised by Dr. Mudhafar M. al-Jarrah.
مصنف مطور للتحقق من الهوية في ديناميكية الكتابة على لوحة المفاتيح باستخدام البيانات التجريبية
Author: al-Rahmani, Abdullah Osamah,
Publication: 2014.
20. Title: Masked face recognition under the COVID-19 using CNN & PCA algorithms / by Sama’a al-Qudah ; supervised by Prof. Dr. Khaled Mohammad Batiha.
التعرف على الوجه المقنع في ظل جائحة كورونا باستخدام خوارزميات تحليل المكون الرئيسي والشبكة العصبية التلافيفيه
Author: Al-Qudah, Sama’a,
Publication: 2022.
21. Title: Securing online shopping using biometric personal authentication and steganography/ by "Hussam Ud-Din" A. Ihmaidy ; supervised by Ahmed al-Jaber.
Author: Ihmaidy, "hussam Ud-Din" A.
Publication: 2005.
22. Title: Intelligent Tracking in Closed Areas Using Deep Learning System : by Mohammad Alkhalefi ; Advisor Abed Al Raoof K. Bsoul .
التعقب الذكي في المناطق المغلقة باستخدام نظام التعلم العميق
Author: Alkhalefi, Mohammad,
Publication: Yarmouk University, Irbid : 2021.
 
 
Results 1 - 22 of 22
Duplicate Items
Add to My List

Print
Sorts and Limits