Applications

1 ) Terrorist identification

2) Autonomous Security System

3) Easy access of customer information 

4) User authentication

5) Facilitates improved human-computer interaction.

 

 

 

 

  [main]      [About]    [Accomplishments]    [Results]    [Presentations]     [Reports]     [Members]