Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
85
LoCaLIzatIon of the edges of the IrIs
Given the obtained results, the five methods—M
1
, M
2
, M
3
, M
4
,
and M
5
—have the same value (equal to 100) for the family F
1
.
For the family F
2
, the best value R
j,k
(equal to 100) is obtained for
both methods M
3
and M
5
. Consequently, these two methods are con-
sidered the best compared to other methods in this family.
At the level of the family F
3
, the method M
4
is better than the two
methods M
3
and M
5
, but it is clearly much better compared to the
other two methods, M
1
and M
2
.
5.3.4 Comparison of the Methods by Outranking Relation
We will compare the effectiveness of the five methods using out-
ranking relations. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147