Volume 65 | Issue 10 | Year 2019 | Article Id. IJMTT-V65I10P506 | DOI : https://doi.org/10.14445/22315373/IJMTT-V65I10P506
Md Haris Uddin Shairf, Ripon Datta, Mounicasri Valavala, "Biometrics Authentication Analysis," International Journal of Mathematics Trends and Technology (IJMTT), vol. 65, no. 10, pp. 41-44, 2019. Crossref, https://doi.org/10.14445/22315373/IJMTT-V65I10P506
[1] Bakkelie, K. A. E., Schneider, S. C., Hagman, C. H., & Petrin, Z. (2017). Effects of flow events and nutrient addition on stream periphyton and macroinvertebrates: an experimental study using flumes. Knowledge & Management of Aquatic Ecosystems, (418), 47.
[2] Kline, M. A., & Boyd, R. (2010). Population size predicts technological complexity in Oceania. Proceedings of the Royal Society B: Biological Sciences, 277(1693), 2559-2564.
[3] Lesk, A. (2019). Introduction to bioinformatics. Oxford University Press.
[4] Peter, S., Pratap Reddy, B., Momtaz, F., & Givargis, T. (2016). Design of secure ECG-based biometric authentication in body area sensor networks. Sensors, 16(4), 570.
[5] Pevsner, J. (2015). Bioinformatics and functional genomics. John Wiley & Sons.
[6] Singh, G. B. (2015). Introduction to bioinformatics. In Fundamentals of Bioinformatics and Computational Biology (pp. 3-10). Springer, Cham.
[7] Tepeler, A., Armagan, A., Sancaktutar, A. A., Silay, M. S., Penbegul, N., Akman, T.,& Akcay, M. (2013). The role of microperc in the treatment of symptomatic lower pole renal calculi. Journal of endourology, 27(1), 13-18.
[8] Trader, D. J., & Carlson, E. E. (2015). Chemoselective enrichment as a tool to increase access to bioactive natural products: Case study borrelidin. Bioorganic & medicinal chemistry letters, 25(21), 4767-4769.
[9] F.L.BOOKSTEIN(1996). BIOMETRICS, BIOMATHEMATICS AND THE MORPHOMETRIC SYNTHESIS. Retrieved from URL: https://link.springer.com/content/pdf/10.1007/BF02458311.pdf
[10] Al S,Bromme A,Tonnies K (2003). Using an active shape structural model for biometric sketch recognition.
[11] Retriveved from URL: https://pdfs.semanticscholar.org/1958/eebd997a2e90b88e1f8bb5345ec88408a1ce.pdf
[12] Sharif MHU, Datta R(2019). SOFTWARE AS A SERVICE HAS STRONG CLOUD SECURITY. Retrieved from URL: https://www.researchgate.net/profile/Haris_Sharif/publication/335232826_Software_as_a_Service_has_Strong_Cloud_Security/links/5d6466fc299bf1f70b0eb0f2/Software-as-a-Service-has-Strong-Cloud-Security.pdf