|
|
|
1.
Title:
Biometric user authentication for IT security : from fundamentals to handwriting / by Claus Vielhauer.
Advances in information security.
Author:
Vielhauer, Claus.
Publication:
Springer, New York : 2005.
|
|
|
|
2.
Title:
Handbook of Biometrics / edited by Anil K. Jain,Patrick Flynn, Arun A. Ross.
Publication:
Springer, New York : 2008.
|
|
|
|
3.
Title:
Biometric systems : technology, design, and performance evaluation / James Wayman ... [et al.] (eds.).
Publication:
Springer, London : cop. 2010.
|
|
|
|
4.
Title:
Biometric person recognition : face, speech and fusion / Conrad Sanderson.
Author:
Sanderson, Conrad.
Publication:
VDM Verlag Dr. Mèuller, Saarbrèucken, Germany : 2008.
|
|
|
|
5.
Title:
New directions in behavioral biometrics / Khalid Saeed ; with Marcin Adamski, Tapalina Bhattasali, Mohammad K. Nammous, Piotr Panasiuk, Mariusz Rybnik, and Soharab H. Shaikh.
Author:
Saeed, Khalid (Computer scientist),
Publication:
CRC Press, Taylor & Francis Group, Boca Raton, FL : [2017]
|
|
|
|
6.
Title:
Text-independent gender-dependent speaker recognition system [electronic resource]/ by el Hajj Malek ; Raja Faddoul ; supervised by Chafic Mokbel.
CD-ROM;
Author:
El Hajj, Malek.
Publication:
2003.
|
|
|
|
7.
Title:
Biometrics / John D. Woodward, Nicholas M. Orlans, Peter T. Higgins.
Biometrics: identity assurance in the information age
Identity assurance in the information age: biometrics
Author:
Woodward, John D., Jr.
Publication:
McGraw-Hill/Osborne, New York : c2003.
|
|
|
|
8.
Title:
Biometric authentication : a machine learning approach / S.Y. Kung, M.W. Mak, S.H. Lin.
Prentice Hall information and system scineces series.
Author:
Kung, S. Y. (Sun Yuan)
Publication:
Prentice Hall Professional Technical Reference, Upper Saddle River, NJ : 2005.
|
|
|
|
9.
Title:
An evaluation model for human iris recognition systems / by Samar Yousef al-Saqqa ; supervised by Mohammad al-Rawi, co-supervisor Mohammad al-Zoubi.
نموذج لتقييم تقنيات التعرف على قزحية العين البشرية.
Author:
al-Saqqa, Samar Yousef.
Publication:
2007.
|
|
|
|
10.
Title:
Efficient iris recognition using reduced iris code method / by Nidaa Hasan al-Omari ; supervised by Abedel Latif abu Dalhoum.
الاسترجاع الفعال لقزحية العين باستخدام ترميز القزحية المختزل
Author:
al-Umari, Nida Hasan Salih.
Publication:
2009.
|
|
|
|
11.
Title:
Classification of cultures for Jordan tourists using
intelligent image analysis / by Dina A. Abdul-Jawad ; supervised by Raja' S. alOmari, co-supervisor Hazem Hiary.
تصنيف ثقافات السياح في الأردن باستخدام التحليل الذكي للصور
Author:
Abd al-Jawad, Dina Ali.
Publication:
2013.
|
|
|
|
12.
Title:
Efficient biometric indexing and retrieval techniques for large-scale systems / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati.
SpringerBriefs in computer science
SpringerBriefs in Computer Science.
Author:
Kavati, Ilaiah,
Publication:
Springer-Verlag, Cham : 2017.
|
|
|
|
13.
Title:
Machine learning for user authentication using keystroke dynamics / by Ahmad Ayman al-Tarawneh
; supervised
by Dr. Mouhammd al-Kasassbeh.
استخدام ديناميات المفاتيح في تعليم الآلة من أجل مصادقة المستخدم
Author:
al-Tarawneh, Ahmad Ayman,
Publication:
2015.
|
|
|
|
14.
Title:
Investigating Hilbert and linear predictive coding transformations for biometric base watermark / by Haifa'a Sulaiman Abu-Zaghlan ; supervised by Ahmad Sharieh, co-supervisor Moussa Habib.
دراسة العلامة المائية البيوقياسية باستخدام مجالي هيلبرت و التشفير التوقعي الخطي.
Author:
Abu-Zaghlan, Haifa'a Sulaiman.
Publication:
2006.
|
|
|
|
15.
Title:
Protecting and prying.
Author:
Open University T215/Block 4.
Publication:
Open University, Milton Keynes : 2012.
Edition:
2nd ed.
|
|
|
|
16.
Title:
Efficient biometric indexing and retrieval techniques for large-scale systems / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati.
SpringerBriefs in computer science
SpringerBriefs in Computer Science.
Author:
Kavati, Ilaiah.
Publication:
SPRINGER, Cham : 2017.
|
|
|
|
17.
Title:
Improvement of Iris recognition system using fuzzy segmentation and neural network / by Kawther Hamadala al-Hawamda ; supervised by Adnan al-Smadi, co-supervisor Esam al-Dawood.
تطوير نظام التعرف على هوية الأشخاص بواسطة قزحية العين بإستخدام تقنية الأنقسام الضبابي والشبكات العصبونية
Author:
al-Hawamidah, Kawthar Hamd Allah Muhammad.
Publication:
2010.
|
|
|
|
18.
Title:
Intelligent Tracking in Closed Areas Using Deep Learning System by Mohammad Alkhalef ; Advisor Dr. Abed Al Raoof K. Bsoul, Co-Supervised
Dr.Moy'awiah A. Al-Shannaq.
التعقب الذكي في المناطق المغلقة بإستخدام نظام التعلم العميق
Author:
Alkhalefi, Mohammad,
Publication:
Yarmouk University, Irbid, Jordan : 2021.
|
|
|
|
19.
Title:
An enhanced classifier for authentication in keystroke dynamics using experimental data / by Abdullah Osamah al-Rahmani ; supervised by Dr. Mudhafar M. al-Jarrah.
مصنف مطور للتحقق من الهوية في ديناميكية الكتابة على لوحة المفاتيح باستخدام البيانات التجريبية
Author:
al-Rahmani, Abdullah Osamah,
Publication:
2014.
|
|
|
|
20.
Title:
Masked face recognition under the COVID-19 using CNN & PCA algorithms
/ by Sama’a al-Qudah ; supervised by Prof. Dr. Khaled Mohammad Batiha.
التعرف على الوجه المقنع في ظل جائحة كورونا باستخدام خوارزميات تحليل المكون الرئيسي والشبكة العصبية التلافيفيه
Author:
Al-Qudah, Sama’a,
Publication:
2022.
|
|
|
|
21.
Title:
Securing online shopping using biometric personal authentication and steganography/ by "Hussam Ud-Din" A. Ihmaidy ; supervised by Ahmed al-Jaber.
Author:
Ihmaidy, "hussam Ud-Din" A.
Publication:
2005.
|
|
|
|
22.
Title:
Intelligent Tracking in Closed Areas Using Deep Learning System : by Mohammad Alkhalefi ; Advisor Abed Al Raoof K. Bsoul .
التعقب الذكي في المناطق المغلقة باستخدام نظام التعلم العميق
Author:
Alkhalefi, Mohammad,
Publication:
Yarmouk University, Irbid : 2021.
|
|
|
|
|
|
|