过去一年中添加的文章,按日期排序

Implementation and Designing of a Smart Door Lock System

YK Verma, P Ghimire, R Bharti, R Deep… - Intelligent Circuits and … - taylorfrancis.com
2 天前 - advanced features such as remote monitoring, keyless entry, visitor access management
and integration with other smart devices. This … , sensors, a user-friendly mobile or web …

An Investigation of Memory Forensics in Kernel Data Structure

M Thakral, T Polly - Advanced Techniques and Applications of … - taylorfrancis.com
2 天前 - … SIM cards and mobile devices. Many manufacturers have their devices default to
using … The storage selection varies based on phone software and user preferences. Essential …

Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System

A Edrah, A Ouda - Computers, 2024 - mdpi.com
7 天前 - … ’s real-time verification process confirms the legitimacy of the phone holder. Finally,
we … gait cycle feature analysis for user identification by examining different individuals’ …

Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment

A Bagwari, J Logeshwaran, M Raja… - Tsinghua Science …, 2024 - ieeexplore.ieee.org
9 天前 - users connect. This new technology has been designed to provide an enhanced
user … of up to 1 GB for mobile devices and 10 GB for fixed devices, as well as live streaming …

Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata

NP Shetty, B Muniyal, A Priyanshu, D Kumar… - IEEE …, 2024 - ieeexplore.ieee.org
12 天前 - … messages and the identity of genuine users, where even users whose access has
been … how user authentication might be improved by combining metadata like device ID, …

Comparison of Volk and Phelcom Portable Fundus Cameras for the Identification of Common Retinal Diseases

C McGlone, C Zhang, B Sandhur… - … & Visual Science, 2024 - iovs.arvojournals.org
12 天前 - … We aim to assess the ability of hand-held, cell-phone-based fundus cameras:
Vista view (Volk) and Eyer (Phelcom) to determine their effectiveness in diagnosing common …

[HTML][HTML] CoreTemp: Coreset Sampled Templates for Multimodal Mobile Biometrics

J Yoon, J Park, J Kim, ABJ Teoh - Applied Sciences, 2024 - mdpi.com
15 天前 - … sampling with an advanced form of pretrained, … mobile devices are shared, such
as educational tablets, we utilize the smaller capacity of CoreTemp to enable identification

[PDF][PDF] Enhancing Mobile Sensor Data Security: Leveraging Deep Learning Techniques

J Deborah, B George - International Journal of Advanced Engineering …, 2024 - ijaeti.com
15 天前 - … The proliferation of mobile devices and the Internet of Things (IoT) has … power of
deep learning, we propose a novel approach to data authentication that promises enhanced

A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication

S Shukla, G Varshney, S Singh, S Goel - arXiv preprint arXiv:2406.09000, 2024 - arxiv.org
15 天前 - … an advanced authentication method for user verification that utilizes the user’s
real-time facial biometric identity, … , the term ”first device” refers to the mobile device attempting to …

[HTML][HTML] Improving smart home surveillance through YOLO model with transfer learning and quantization for enhanced accuracy and efficiency

S Dalal, UK Lilhore, N Sharma, S Arora… - PeerJ Computer …, 2024 - peerj.com
16 天前 - … Smart city surveillance uses advancedusers are capable to manage the temperature,
turn off the lights, secure the doors, and monitor the home remotely from the mobile device