|
|
|
Suleyman Al-Showarah,Wael Alzyadat,Aysh Alhroob,Hisham Al-Assam
Pág. pp. 126 - 136
Abstract - This research presents a methodology for user identification using ten English words written by a finger on smartphone and mini-tablet. This research considers three features, namely Signature Precision (SP), Finger Pressure (FP), and Movement...
ver más
|
|
|
|
|
|
|
Emil Jovanov, B.M.S. Bahar Talukder, David C. Schwebel and W. Douglas Evans
Ubiquitous intelligence of Internet of Things (IoT) objects and new sensors provide innovative solutions for a variety of health issues. Unintentional child poisoning represents an increasingly important health issue worldwide, partially because of an in...
ver más
|
|
|
|
|
|
|
Suleyman AlShowarah
Pág. pp. 133 - 142
This paper presents methodology for user identification on smartphone and mini-tablet using finger based gestures. In this paper, a set of four features, namely Signature Precision (SP), Finger Pressure (FP), Movement Time (MT), and Speed were extracted ...
ver más
|
|
|
|
|
|
|
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste...
ver más
|
|
|
|
|
|
|
|
Jingbo Zhang, Lili Cai and Shufang Zhang
Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. Whe...
ver más
|
|
|
|
|
|
|
Jingbo Zhang, Lili Cai and Shufang Zhang
Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. Whe...
ver más
|
|
|
|
|
|
|
FERNANDA FLACH, MARCO AURELIO STUMPF GONZALEZ, ANDREA PARISI KERN
Pág. Page 83 - 98
The purpose of this paper is to investigate how the knowledge of real estate market can be used to support user requirement identification. A construction project well adjusted to the user requirements increase value and causes minors changes during its ...
ver más
|
|
|
|
|
|
|
Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam and Md Ezharul Islam
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, dia...
ver más
|
|
|
|
|
|
|
René Reinhard, Erinchan Telatar and Shah Rukh Humayoun
Virtual reality technologies, including head-mounted displays (HMD), can provide benefits to psychological research by combining high degrees of experimental control with improved ecological validity. This is due to the strong feeling of being in the dis...
ver más
|
|
|
|
|
|
|
Moses Adah Agana,Akpan Idorenyin Beranard
This study utilized biometric fingerprint recognition and Global system for Mobile Communication (GSM) Short Message Service (SMS) to identify military armoury users and alert possible intrusion to take arms without authorization respectively. This is ai...
ver más
|
|
|
|
|
|
|
Eugene Ilyushin,Dmitry Namiot
Pág. 11 - 19
AI technologies, which have received an impetus in development in recent years due to the emergence of a significant amount of data and computing resources, have greatly influenced many areas of human life, and for some of them, they have become an integ...
ver más
|
|
|
|
|
|
|
Eugene Ilyushin,Dmitry Namiot
Pág. 11 - 19
AI technologies, which have received an impetus in development in recent years due to the emergence of a significant amount of data and computing resources, have greatly influenced many areas of human life, and for some of them, they have become an integ...
ver más
|
|
|
|
|
|
|
Matko Gluncic, Ines Vlahovic, Leo Mr?ic and Vladimir Paar
Tandem repeats (TRs) are important components of eukaryotic genomes; they have both structural and functional roles: (i) they form essential chromosome structures such as centromeres and telomeres; (ii) they modify chromatin structure and affect transcri...
ver más
|
|
|
|
|
|
|
Pedro Pintor, Manuel Lopez-Martinez, Emilio Gonzalez, Jan Safar and Ronan Boyle
Global Navigation Satellite System (GNSS) technology supports all phases of maritime navigation and serves as an integral component of the Automatic Identification System (AIS) and, by extension, Vessel Traffic Service (VTS) systems. However, the accurac...
ver más
|
|
|
|
|
|
|
Mitra Pooyandeh, Ki-Jin Han and Insoo Sohn
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual reality. The three basic technologies for building the Metaverse are immersive technologies, artificial intelligence, and blockchain. Companies are subsequent...
ver más
|
|
|
|
|
|
|
Sanjiwana Arjasakusuma, Sandiaga Swahyu Kusuma, Raihan Rafif, Siti Saringatin and Pramaditya Wicaksono
The rise of Google Earth Engine, a cloud computing platform for spatial data, has unlocked seamless integration for multi-sensor and multi-temporal analysis, which is useful for the identification of land-cover classes based on their temporal characteris...
ver más
|
|
|
|
|
|
|
Pavani V L
Pág. pp. 4 - 19
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The percep...
ver más
|
|
|
|
|
|
|
A. S. Oharkov,E. H. Vasetskyi,H. L. Morozov,S. V. Kukhlivskyi
Pág. 189 - 193
The article describes a promising idea of solving more and more pressing problem of personality authentication in the Internet. Growing popularity of the Internet carries with itself the problem of man anonymity in a network. The article suggests inculca...
ver más
|
|
|
|
|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|