Mohammadi, Jafar (2017)
The broadcasting attribute of the wireless communication channel poses severe security vulnerabilities since any adversary node in the range of reception is able to listen as well as to disrupt the ongoing communication. This dissertation considers the problem of security from two different perspectives: The information-theoretic approach at the physical-layer to avert eavesdropping and central...Low complexity embedded fingerprint verification and identification system
Sun, Wei (2016)
A qualified fingerprint verification and identification system should resolve most of the problems of fingerprint image enhancement and fingerprint matching. In practice, the fingerprint images are not ideal and may have totally different qualities when the fingers are too moist too dry, improperly placed, or from some users who are engaged in heavy manual work. Furthermore nonlinear deformatio...
- 2 true