Results 41 to 50 of about 63,648 (277)

Implementing fingerprint authentication in computer-based tests

open access: yesNigerian Journal of Technology, 2021
The use of computers to conduct examinations is more effective than traditional paper-based examinations in terms of immediate availability of results and long term cost effectiveness. This however is faced with identifying and authenticating the real identities of the examinees so as to reduce impersonation. The study examined the
Evwiekpaefe, A.E., Eyinla, V.O.
openaire   +3 more sources

Wireless Device Identification Scheme Based on CSI Feature Fingerprints [PDF]

open access: yesJisuanji gongcheng
In recent years, wireless networks have been widely used in healthcare, industry, education, and military applications. However, security threats for these networks are increasing. Traditional cryptographic authentication methods have several limitations,
QI Fengyi, ZHANG Xinyou, FENG Li, XING Huanlai
doaj   +1 more source

PRNU Fingerprint Purification Algorithm for Open Environment [PDF]

open access: yesJisuanji kexue
Non-unique artifacts(NUAs) noise generated by digital image post-processing pipeline is mixed in unique and stable photo response non-uniformity(PRNU) fingerprints.It seriously affects the precision of the downstream source camera identification(SCI ...
LIU Yufei, XIAO Yanhui, TIAN Huawei
doaj   +1 more source

Single-molecule protein sequencing through fingerprinting: computational assessment

open access: yesPhysical Biology, 2015
Proteins are vital in all biological systems as they constitute the main structural and functional components of cells. Recent advances in mass spectrometry have brought the promise of complete proteomics by helping draft the human proteome. Yet, this commonly used protein sequencing technique has fundamental limitations in sensitivity. Here we propose
Yao, Y.   +4 more
openaire   +5 more sources

K-Means Fingerprint Clustering for Low-Complexity Floor Estimation in Indoor Mobile Localization

open access: yes, 2015
Indoor localization in multi-floor buildings is an important research problem. Finding the correct floor, in a fast and efficient manner, in a shopping mall or an unknown university building can save the users' search time and can enable a myriad of ...
Lohan, Elena-Simona   +2 more
core   +1 more source

Joint RAN Slicing and Computation Offloading for Autonomous Vehicular Networks: A Learning-Assisted Hierarchical Approach

open access: yesIEEE Open Journal of Vehicular Technology, 2021
In this paper, a two-timescale radio access network (RAN) slicing and computing task offloading problem is investigated for a cloud-enabled autonomous vehicular network (C-AVN).
Qiang Ye   +5 more
doaj   +1 more source

Text Classification For Authorship Attribution Analysis

open access: yes, 2013
Authorship attribution mainly deals with undecided authorship of literary texts. Authorship attribution is useful in resolving issues like uncertain authorship, recognize authorship of unknown texts, spot plagiarism so on. Statistical methods can be used
Elayidom, M. Sudheep   +3 more
core   +1 more source

Cloud-Based Service for Fingerprint Image Matching

open access: yesWasit Journal of Computer and Mathematics Science
Fingerprint matching is one of the most important services that related to the issue of identifying individuals, as it can be used to verify the validity of contracts, documents or in other security fields such as criminal investigations.
Ethar Abdul Wahhab Hachim
doaj   +1 more source

Transferrin receptor 1‐mediated iron uptake supports thermogenic activation in human cervical‐derived adipocytes

open access: yesFEBS Letters, EarlyView.
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai   +9 more
wiley   +1 more source

Attention Map Is All We Need for Lightweight Fingerprint Liveness Detection

open access: yesIEEE Access
To counter the security threats posed by presentation attacks on fingerprint authentication systems, various deep learning-based fingerprint liveness detection methods have been proposed.
Hyun Jun Yook   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy