Applications 1 ) Terrorist identification 2) Autonomous Security System 3) Easy access of customer information 4) User authentication 5) Facilitates improved human-computer interaction.
|
[main] [About] [Accomplishments] [Results] [Presentations] [Reports] [Members]