Results 21 to 30 of about 1,597,742 (299)
Improved Virtual Transaction System Scheme Based on Commitment-signature Primitive and Multisignature [PDF]
As the third party payment is introduced into a Four-participants Virtual Economy System(4P_VES) to detect and prevent collusion cheat,so many interactions are added,and the system performance is affected.Aiming at the problem,this paper proposes an ...
ZHANG Hong,CAO Zhenfu,DONG Xiaolei
doaj +1 more source
Spatial signature for secure MISO‐OFDM systems [PDF]
Physical layer security is a promising approach to establish secure communications based on the characteristics of wireless channels. A spatial signature based secure multiple‐input single‐output (MISO) orthogonal frequency division multiplexing (OFDM) system is proposed to disrupt the reception of a passive eavesdropper by holding two practically ...
Ozbek, B., Kurt, G. K.
openaire +4 more sources
Signatures of Quantum Mechanics in Chaotic Systems [PDF]
We examine the quantum-classical correspondence from a classical perspective by discussing the potential for chaotic systems to support behaviors normally associated with quantum mechanical systems. Our main analytical tool is a chaotic system’s set of cupolets, which are highly-accurate stabilizations of its unstable periodic orbits. Our discussion is
Kevin M. Short, Matthew A. Morena
openaire +4 more sources
Signing a document or a cheque by hand or using a stored image‐based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can
Abdulaziz Almehmadi
doaj +1 more source
Molecular “omic” signatures in systemic sclerosis
Systemic sclerosis (SSc) is a connective tissue disorder characterized by immunologic, vascular, and extracellular matrix abnormalities. Variation in the proportion and/or timing of activation in the deregulated molecular pathways that underlie SSc may explain the observed clinical heterogeneity in terms of disease phenotype and treatment response.
Bhaven K. Mehta +3 more
openaire +3 more sources
A New Approach to Compute System Reliability with Three-Serially Linked Modules
The efficiency of a bridge system and a 2-out-of-4:G system has been evaluated in the proposed work. The technique for evaluating the system’s reliability and signature reliability of different models has been employed in this work.
Sadiya, Mangey Ram, Akshay Kumar
doaj +1 more source
Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition [PDF]
Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet ...
Atefeh Foroozandeh +2 more
doaj +1 more source
Signature Limits in Mindreading Systems [PDF]
AbstractRecent evidence that young children seem to both understand false belief in one sense, but not in another, has led to two‐systems theorizing about mindreading. By analyzing the most detailed two‐systems approach in studying social cognition—the theory of mindreading defended by Ian Apperly and Stephen Butterfill—I argue that that even when ...
openaire +2 more sources
New online signature acquisition system [PDF]
Nous présentons un système d'acquisition de signature en ligne sans contrainte et à faible coût qui a été développé pour améliorer les performances d'un système d'authentification biométrique multimodal existant (basé initialement sur des modalités de voix et d'image).
Adel Oulefki +5 more
openaire +2 more sources
Vulnerability Analysis and Detection of Android System Signature [PDF]
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj +1 more source

