Suggested Topics within your search.
Suggested Topics within your search.
-
41
Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal
Published 2025-01-01“…Improvements in road infrastructure, technological advancements at traffic light intersections, and the adoption of electric or hybrid vehicles are insufficient to resolve these issues. Maximizing the use of public transit and shared transportation is essential for this purpose. …”
Get full text
Article -
42
Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data
Published 2025-01-01“…In this paper, we present a study on copula-driven learning techniques for physical layer authentication (PLA) in wireless communication, using data from multiple modalities. …”
Get full text
Article -
43
"Authentic and Amazing": authenticity as an evaluative category in online consumer restaurant reviews
Published 2024-02-01“…Claims and evaluations of authenticity are a powerful resource in food discourse: reviewers use evaluations of authenticity to demonstrate their expertise, and restaurants viewed as authentic receive higher star ratings. …”
Get full text
Article -
44
The Role of Value Judgment in Congruent Personalities, Trait Authenticity, and Authentic Leadership
Published 2019-06-01“…Support was found for all hypotheses testing for associations between value judgment and authenticity, and if value judgment predicted psychological congruence and authentic leadership and further identifies the type of value judgment used in the constructs of congruence and authenticity.…”
Get full text
Article -
45
The Use of Authentic Materials in English-medium Instructed Business Classes in Higher Education to Improve Learning
Published 2024-12-01“…Objective: This research evaluates the academic efficacy of authentic materials used in EMI classes at TBS. Method: The study incorporates data collection methods such as student questionnaire copies, teacher interviews, classroom observations, and document surveys. …”
Get full text
Article -
46
Scalable Behavioral Authentication
Published 2021-01-01“…A Behavioral Authentication (BA) system constructs a behavioral profile for a user and uses it to verify their identity claims. …”
Get full text
Article -
47
Chaotic Watermarking for Authentication
Published 2013-07-01“…As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. …”
Get full text
Article -
48
-
49
Jeremiah's Prophetic Authenticity
Published 2024-12-01“…While prophecy fulfilment is commonly used to assess authenticity, its unreliability calls for a more testable method grounded in Moses’ model. …”
Get full text
Article -
50
Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods
Published 2024-01-01“…In this work, we propose an authentication method based on radio frequency fingerprinting (RFF) using deep learning. …”
Get full text
Article -
51
Human biosample authentication using the high-throughput, cost-effective SNPtrace(TM) system.
Published 2015-01-01“…Here we evaluate a panel of 96 single-nucleotide polymorphism (SNP) assays utilizing Fluidigm microfluidics technology for authentication and sex determination of human cell lines. …”
Get full text
Article -
52
ANCHOR-Grid: Authenticating Smart Grid Digital Twins Using Real-World Anchors
Published 2025-05-01Get full text
Article -
53
Rapid authentication of the Cicadidae Periostracum using a COI sequence-based SCAR markers
Published 2020-01-01Get full text
Article -
54
Performance Enhancement of EEG Signatures for Person Authentication Using CNN BiLSTM Method
Published 2024-11-01“…This study aims to improve the effectiveness of person authentication by using deep learning techniques on electroencephalogram (EEG) signals. …”
Get full text
Article -
55
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Published 2025-05-01Get full text
Article -
56
Robust deepfake detection using Long Short-Term Memory networks for video authentication
Published 2025-03-01“…The dataset sourced from DFDC and Celeb-Df are converted into frames from videos, in this architecture first face recognition tool is used for detecting the faces, followed by ResNext for feature extraction and then LSTM is used to classify the videos. …”
Get full text
Article -
57
Improving the Reliability of Biometric Authentication Processes Using a Model for Reducing Data Drift
Published 2024-12-01“…This paper's objective is to improve the reliability of biometric authentication by increasing the informativity of the classified images by transforming the correlations between the information features using the Bayes-Minkowski measure. …”
Get full text
Article -
58
Biometric Authentication Using Chest Wall Displacement Recorded by VHF-Band Loop Antenna
Published 2024-01-01“…In this study, we propose a biometric authentication system that uses chest wall displacement recorded by a wearable electromagnetic near-field sensor (NFS) module with a very high frequency (VHF)-band small-loop antenna. …”
Get full text
Article -
59
Authenticating Raw from Reconstituted Milk Using Fourier Transform Infrared Spectroscopy and Chemometrics
Published 2019-01-01“…Fourier transform infrared (FTIR) spectroscopy combined with chemometrics was used to authenticate raw milk from their reconstituted counterparts. …”
Get full text
Article -
60