Results 41 to 50 of about 122,790 (284)
Signature Recognition Based on Discrete Wavelet Transform
Personal identification is an actively developing area of research. Human signature is a vital biometric attribute which can be used to authenticate human identity. There are many approaches to recognize signature with a lot of researches.
Sivana Salahadin Muhamad +1 more
doaj +1 more source
Attribute-based signatures and eIDAS 2.0
Digital authentication and electronic signatures are essential for reliable digital verification of identities in the digital environment. With the introduction of European Digital Identity Wallets under eIDAS 2.0, there has been a shift in the use of ...
Yong Yong Hu
doaj +1 more source
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian +7 more
wiley +1 more source
Relational Foundations For Functorial Data Migration
We study the data transformation capabilities associated with schemas that are presented by directed multi-graphs and path equations. Unlike most approaches which treat graph-based schemas as abbreviations for relational schemas, we treat graph-based ...
Abiteboul Serge +3 more
core +1 more source
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti +12 more
wiley +1 more source
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [PDF]
Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or ...
C Olston +6 more
core +3 more sources
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider +4 more
wiley +1 more source
Attribute-Based Signatures with User-Controlled Linkability [PDF]
In this paper, we introduce Attribute-Based Signatures with User-Controlled Linkability ABS-UCL. Attribute-based signatures allow a signer who has enough credentials/attributes to anonymously sign a message w.r.t. some public policy revealing neither the attributes used nor his identity.
Ghadafi, Essam M O +3 more
openaire +2 more sources
A prototype implementation of the AUnit test automation framework for alloy [PDF]
Alloy is a declarative language based on relational first-order logic. Unlike commonly used procedural languages, the testing criteria of declarative languages like Alloy has remained largely ad hoc.
Yu, Jiaolong
core +1 more source

