Results 81 to 90 of about 7,700 (189)
Photonics plays a crucial role in thermal management by manipulating electromagnetic waves for energy production and efficiency. This review explores strategically designed photonic structures that leverage both solar absorption (UV–NIR) and thermal emission (MIR) for heating and cooling applications.
Joo Hwan Ko +5 more
wiley +1 more source
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used.
Ghazel Albakri, Sharifa Alghowinem
doaj +1 more source
A Review of Modeling and Control Techniques for Unmanned Aerial Vehicles
By systematically classifying UAV modeling techniques and comparing control methods, this paper addresses a notable gap in the current literature. Furthermore, it highlights emerging trends and challenges in UAV control systems, providing valuable insights to guide future research toward enhancing the stability, efficiency, and adaptability of ...
Elisabeth Andarge Gedefaw +2 more
wiley +1 more source
Exploring the Security of Mobile Face Recognition: Attacks, Defenses, and Future Directions
Biometric authentication on smartphones has advanced rapidly in recent years, with face recognition becoming the dominant modality due to its convenience and easy integration with modern mobile hardware.
Elísabet Líf Birgisdóttir +5 more
doaj +1 more source
A Novel High-Performance Face Anti-Spoofing Detection Method
Accurate face recognition technology is of great significance for face anti-counterfeiting. Due to illumination, posture, angle, and other reasons, the existing face liveness detection technology is difficult to adapt the environmental changes, resulting
Hui Qi, Rui Han, Ying Shi, Xiaobo Qi
doaj +1 more source
Multimodal large language models (MLLMs) have demonstrated strong capabilities in vision-related tasks, capitalizing on their visual semantic comprehension and reasoning capabilities.
Yichen Shi +9 more
doaj +1 more source
Face recognition systems are increasingly used in biometric security for convenience and effectiveness. However, they remain vulnerable to spoofing attacks, where attackers use photos, videos, or masks to impersonate legitimate users.
Arman Keresh, Pakizar Shamoi
doaj +1 more source
Face Liveness Detection Using Defocus
In order to develop security systems for identity authentication, face recognition (FR) technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D
Sooyeon Kim, Yuseok Ban, Sangyoun Lee
doaj +1 more source
Enhancing Trust in eAssessment - the TeSLA System Solution
Trust in eAssessment is an important factor for improving the quality of online-education. A comprehensive model for trust based authentication for eAssessment is being developed and tested within the score of the EU H2020 project TeSLA.
Bhattacharjee, Sushil +4 more
core
Slapstick Classicism: Chaplin among the Sculptures
Critical Quarterly, Volume 67, Issue 4, Page 42-64, December 2025.
James Reath
wiley +1 more source

