Results 41 to 50 of about 63,648 (277)
Implementing fingerprint authentication in computer-based tests
The use of computers to conduct examinations is more effective than traditional paper-based examinations in terms of immediate availability of results and long term cost effectiveness. This however is faced with identifying and authenticating the real identities of the examinees so as to reduce impersonation. The study examined the
Evwiekpaefe, A.E., Eyinla, V.O.
openaire +3 more sources
Wireless Device Identification Scheme Based on CSI Feature Fingerprints [PDF]
In recent years, wireless networks have been widely used in healthcare, industry, education, and military applications. However, security threats for these networks are increasing. Traditional cryptographic authentication methods have several limitations,
QI Fengyi, ZHANG Xinyou, FENG Li, XING Huanlai
doaj +1 more source
PRNU Fingerprint Purification Algorithm for Open Environment [PDF]
Non-unique artifacts(NUAs) noise generated by digital image post-processing pipeline is mixed in unique and stable photo response non-uniformity(PRNU) fingerprints.It seriously affects the precision of the downstream source camera identification(SCI ...
LIU Yufei, XIAO Yanhui, TIAN Huawei
doaj +1 more source
Single-molecule protein sequencing through fingerprinting: computational assessment
Proteins are vital in all biological systems as they constitute the main structural and functional components of cells. Recent advances in mass spectrometry have brought the promise of complete proteomics by helping draft the human proteome. Yet, this commonly used protein sequencing technique has fundamental limitations in sensitivity. Here we propose
Yao, Y. +4 more
openaire +5 more sources
K-Means Fingerprint Clustering for Low-Complexity Floor Estimation in Indoor Mobile Localization
Indoor localization in multi-floor buildings is an important research problem. Finding the correct floor, in a fast and efficient manner, in a shopping mall or an unknown university building can save the users' search time and can enable a myriad of ...
Lohan, Elena-Simona +2 more
core +1 more source
In this paper, a two-timescale radio access network (RAN) slicing and computing task offloading problem is investigated for a cloud-enabled autonomous vehicular network (C-AVN).
Qiang Ye +5 more
doaj +1 more source
Text Classification For Authorship Attribution Analysis
Authorship attribution mainly deals with undecided authorship of literary texts. Authorship attribution is useful in resolving issues like uncertain authorship, recognize authorship of unknown texts, spot plagiarism so on. Statistical methods can be used
Elayidom, M. Sudheep +3 more
core +1 more source
Cloud-Based Service for Fingerprint Image Matching
Fingerprint matching is one of the most important services that related to the issue of identifying individuals, as it can be used to verify the validity of contracts, documents or in other security fields such as criminal investigations.
Ethar Abdul Wahhab Hachim
doaj +1 more source
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai +9 more
wiley +1 more source
Attention Map Is All We Need for Lightweight Fingerprint Liveness Detection
To counter the security threats posed by presentation attacks on fingerprint authentication systems, various deep learning-based fingerprint liveness detection methods have been proposed.
Hyun Jun Yook +5 more
doaj +1 more source

