A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

[PDF][PDF] Remote Sensing and Spatial Statistics as Tools in Crime Analysis

R Udayakumar - ijmrset.com
This chapter explores the feasibility and utility of using aerial photography or remotely
sensed satellite imagery to identify geographic or “place” features that may be associated …

[PDF][PDF] One Sample Image from Face Recognition Robust to Head Pose

R Udayakumar - ijmrset.com
The Most face recognition systems only work well under quite constrain environments. In
particular, the illumination environment, facial expressions and head pose must be tightly …

[PDF][PDF] Object Tracing Using Fast Fourier Transform

R Udayakumar - ijmrset.com
Detection and recognition of textual information in an image or video sequence is important
for many applications. The increased resolution and capabilities of digital cameras and …