158   Artículos

 
en línea
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi    
Fingerprint analysis has long been a cornerstone in criminal investigations for suspect identification. Beyond this conventional role, recent efforts have aimed to extract additional demographic information from fingerprints, such as gender, age, and nat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto    
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jin Su Kim, Cheol Ho Song, Jae Myung Kim, Jimin Lee, Yeong-Hyeon Byeon, Jaehyo Jung, Hyun-Sik Choi, Keun-Chang Kwak, Youn Tae Kim, EunSang Bak and Sungbum Pan    
Current advancements in biosignal-based user recognition technology are paving the way for a next-generation solution that addresses the limitations of face- and fingerprint-based user recognition methods. However, existing biosignal benchmark databases ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuting Sun, Yanfeng Tang and Xiaojuan Chen    
Fingerprints are the most widely used of all biological characteristics in public safety and forensic identification. However, fingerprint images extracted from the crime scene are incomplete. On the one hand, due to the lack of effective area in partial... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ahmed M. Nor, Octavian Fratu and Simona Halunga    
In this article, we propose a new RIS passive beamforming scheme in two main stages. First, a fingerprint-based codebook (FP-CB) design phase occurs, where the area of interest is divided into a number of points and the optimal reflection patterns (RPs) ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Junqiang Chen, Guang Cheng and Hantao Mei    
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Alan Huang and Justie Su-Tzu Juan    
A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and man... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yuanjun Ye, Haiping Fu, Yiwei Zhou, Shanxin Zhang, Zehuang Wang, Lihua Tian, Jianjun Tan, Genfa Zhu, Jinmei Liu and Yechun Xu    
Caladiums are promising colorful foliage plants due to their unique leaf shapes and dazzling colors. Until now, over 2000 varieties of Caladium have been cultivated worldwide. The long-term natural variation and artificial selection have enriched the ger... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Juan Wang, Jing Zhong and Jiangqi Li    
With the development of IoT, IoT devices have proliferated. With the increasing demands of network management and security evaluation, automatic identification of IoT devices becomes necessary. However, existing works require a lot of manual effort and f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Soorim Yang, Kyoung-Hwan Kim, Hye-Ryeong Jeong, Seokjun Lee and Jaeho Kim    
The COVID-19 pandemic has underscored the necessity for rapid contact tracing as a means to effectively suppress the spread of infectious diseases. Existing contact tracing methods leverage location-based or distance-based detection to identify contact w... ver más
Revista: Applied System Innovation    Formato: Electrónico

« Anterior     Página: 1 de 10     Siguiente »