Search alternatives:
use » used (Expand Search)
Showing 41 - 60 results of 3,455 for search 'use authentication', query time: 0.14s Refine Results
  1. 41

    Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal by Lina Sofía Cardona Martínez, Cesar Andrés Sandoval Muñoz, Ricardo Salazar-Cabrera, Álvaro Pachón de la Cruz, Juan Manuel Madrid Molina

    Published 2025-01-01
    “…Improvements in road infrastructure, technological advancements at traffic light intersections, and the adoption of electric or hybrid vehicles are insufficient to resolve these issues. Maximizing the use of public transit and shared transportation is essential for this purpose. …”
    Get full text
    Article
  2. 42

    Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data by Sahana Srikanth, Sanjeev Gurugopinath, Sami Muhaidat

    Published 2025-01-01
    “…In this paper, we present a study on copula-driven learning techniques for physical layer authentication (PLA) in wireless communication, using data from multiple modalities. …”
    Get full text
    Article
  3. 43

    "Authentic and Amazing": authenticity as an evaluative category in online consumer restaurant reviews by Dominick Boyle

    Published 2024-02-01
    “…Claims and evaluations of authenticity are a powerful resource in food discourse: reviewers use evaluations of authenticity to demonstrate their expertise, and restaurants viewed as authentic receive higher star ratings. …”
    Get full text
    Article
  4. 44

    The Role of Value Judgment in Congruent Personalities, Trait Authenticity, and Authentic Leadership by Malcolm North, Julie Nelson, Clifford Hurst

    Published 2019-06-01
    “…Support was found for all hypotheses testing for associations between value judgment and authenticity, and if value judgment predicted psychological congruence and authentic leadership and further identifies the type of value judgment used in the constructs of congruence and authenticity.…”
    Get full text
    Article
  5. 45

    The Use of Authentic Materials in English-medium Instructed Business Classes in Higher Education to Improve Learning by Bilel Elmotri, Mubarak Altwaiji, Mohamed Desoky Rabeh, Mustafa Ahmed Al-humari, Farid Amri, Yasir M. Elyasa, Muna Telha

    Published 2024-12-01
    “…Objective: This research evaluates the academic efficacy of authentic materials used in EMI classes at TBS. Method: The study incorporates data collection methods such as student questionnaire copies, teacher interviews, classroom observations, and document surveys. …”
    Get full text
    Article
  6. 46

    Scalable Behavioral Authentication by Md Morshedul Islam, Reihaneh Safavi-Naini, Marc Kneppers

    Published 2021-01-01
    “…A Behavioral Authentication (BA) system constructs a behavioral profile for a user and uses it to verify their identity claims. …”
    Get full text
    Article
  7. 47

    Chaotic Watermarking for Authentication by Melad Saeed

    Published 2013-07-01
    “…As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. …”
    Get full text
    Article
  8. 48
  9. 49

    Jeremiah's Prophetic Authenticity by Ferry Y. Mamahit, Christian Reynaldi Widodo

    Published 2024-12-01
    “…While prophecy fulfilment is commonly used to assess authenticity, its unreliability calls for a more testable method grounded in Moses’ model. …”
    Get full text
    Article
  10. 50

    Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods by Da Huang, Akram Al-Hourani

    Published 2024-01-01
    “…In this work, we propose an authentication method based on radio frequency fingerprinting (RFF) using deep learning. …”
    Get full text
    Article
  11. 51

    Human biosample authentication using the high-throughput, cost-effective SNPtrace(TM) system. by May M Y Liang-Chu, Mamie Yu, Peter M Haverty, Julie Koeman, Janet Ziegle, Marie Lee, Richard Bourgon, Richard M Neve

    Published 2015-01-01
    “…Here we evaluate a panel of 96 single-nucleotide polymorphism (SNP) assays utilizing Fluidigm microfluidics technology for authentication and sex determination of human cell lines. …”
    Get full text
    Article
  12. 52
  13. 53
  14. 54

    Performance Enhancement of EEG Signatures for Person Authentication Using CNN BiLSTM Method by Ashish Ranjan Mishra, Rakesh Kumar, Rajkumar Saini

    Published 2024-11-01
    “…This study aims to improve the effectiveness of person authentication by using deep learning techniques on electroencephalogram (EEG) signals. …”
    Get full text
    Article
  15. 55
  16. 56

    Robust deepfake detection using Long Short-Term Memory networks for video authentication by Ravi Kishan Surapaneni, Hameed Syed, Harshitha Kakarala, Venkata Sai Srikar Yaragudipati

    Published 2025-03-01
    “…The dataset sourced from DFDC and Celeb-Df are converted into frames from videos, in this architecture first face recognition tool is used for detecting the faces, followed by ResNext for feature extraction and then LSTM is used to classify the videos. …”
    Get full text
    Article
  17. 57

    Improving the Reliability of Biometric Authentication Processes Using a Model for Reducing Data Drift by Vladimir Zh. Kuklin, Naur Z. Ivanov, Alexander N. Muranov, Islam A. Alexandrov, Elena Yu. Linskaya

    Published 2024-12-01
    “…This paper's objective is to improve the reliability of biometric authentication by increasing the informativity of the classified images by transforming the correlations between the information features using the Bayes-Minkowski measure. …”
    Get full text
    Article
  18. 58

    Biometric Authentication Using Chest Wall Displacement Recorded by VHF-Band Loop Antenna by Shun Hinatsu, Saki Wada

    Published 2024-01-01
    “…In this study, we propose a biometric authentication system that uses chest wall displacement recorded by a wearable electromagnetic near-field sensor (NFS) module with a very high frequency (VHF)-band small-loop antenna. …”
    Get full text
    Article
  19. 59

    Authenticating Raw from Reconstituted Milk Using Fourier Transform Infrared Spectroscopy and Chemometrics by Lijuan Du, Weiying Lu, Boyan Gao, Jing Wang, Liangli (Lucy) Yu

    Published 2019-01-01
    “…Fourier transform infrared (FTIR) spectroscopy combined with chemometrics was used to authenticate raw milk from their reconstituted counterparts. …”
    Get full text
    Article
  20. 60