NETFLIX bigdata analytics-the emergence of data driven recommendation

S Maddodi - Srivatsa Maddodi, & Krishna Prasad, K.(2019) …, 2019 - papers.ssrn.com
Netflix is one of the largest online streaming media providers. It began its operations in
1997. Founded by two tech entrepreneur Reed Hastings and Marc Randolph. The …

Research on routing optimization of SDN network using reinforcement learning method

Z Yuan, P Zhou, S Wang… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
The development of computer networks is making it become more complex and dynamic.
How to achieve efficient package-routing in the SDN (Software Design Network) has …

ABCD Analysis of Fingerprint Hash Code, Password and OTP based Multifactor Authentication Model

PS Aithal - 2018 - papers.ssrn.com
Authentication is the usage of one or multiple mechanisms to show that who you declare or
claim to be. Authentication ensures that users are granted to some resources or services …

Research on indoor position fingerprint location based on machine learning combined particle filter

Z Yuan, X Zhang, P Zhou… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
With the rapid development of wireless networks, wireless positioning technology has also
rapidly gained popularity. At the same time, more and more indoor positioning scenes have …

Preprocessing latent-fingerprint images for improving segmentation using morphological snakes

H Walhazi, LR Haddada, A Maalej… - 2020 5th International …, 2020 - ieeexplore.ieee.org
Latent fingerprints have played a critical role in identifying criminals and suspects. However,
latent fingerprint identification is more complicated than plain and rolled fingerprints mainly …

ABCD Analysis of Fingerprint Biometric Attendance Maintenance System

K Krishna Prasad - International Journal of Applied Engineering …, 2018 - papers.ssrn.com
The drastic developments in Information and Communication Technology enabled many
types of technology-aided attendance maintenance system in Higher Educational …

Digital Signature Technology of Mobile Phone Verification Code based on Biometrics

B Li, P Wang, X Zhang, Z Wang - 2023 IEEE 34th Annual …, 2023 - ieeexplore.ieee.org
As the most common way of mobile phone identity authentication, verification code has
many security risks. In order to enhance its security, this paper proposes a technology which …

Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition

K Krishna Prasad - … Journal of Management, Technology and Social …, 2018 - papers.ssrn.com
Authentication is using one or multiple mechanisms to show that you are who you claim to
be. As soon as the identity of the human or machine is demonstrated, then human or …

[PDF][PDF] An Artificial Intelligence (AI) Enabled Framework for Cyber Security Using Machine Learning Techniques

SS Ahmad, K Krishna Prasad… - PARROHA MULTIPLE …, 2023 - parrohamc.edu.np
Cyber security has become very important aspect with respect to security in the
contemporary era. The rationale behind this is that, with the emergence of Internet of Things …

[PDF][PDF] A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE AND IRIS RECOGNITION

K Krishna Prasad, PS Aithal - Chapter of the Book “Impact of Ideas …, 2019 - researchgate.net
By definition, Authentication is using one or multiple mechanisms to show that you are who
you claim to be. As soon as the identity of the human or machine is demonstrated, then …