Since the advent of smartphones, capturing images has become deeply embedded in human behavior, evolving into a fundamental part of daily life. Research into human perception of image quality is crucial as people freq...
详细信息
High-precision indoor vehicle localization technology has recently been a research hotspot for indoor location services. This paper investigate the indoor combined positioning technology based on Ultra wide band (UWB)...
详细信息
Botnets have become a severe security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic, and the ever-larger number of cybercrim...
详细信息
Quantitative Structure-Activity Relationship (QSAR) modeling is an approach employed to predict the biological response of chemical compounds by considering their structural attributes. Classification machine learning...
详细信息
Modern society relies heavily on mobile phones to communicate. One of the most valuable mobile phone services is SMS (Short Message Service), which simplifies communication greatly. There have been spammers who have m...
详细信息
In terms of death rates, breast cancer comes in second, among women with cancer. Despite the fact that cancer cells grow in a multistep process involving a number of different types of cells, prevention of breast canc...
详细信息
As a matter of public safety and resource allocation, crime prediction is of paramount importance. As a result of applying data preprocessing techniques and a graph-based approach, this paper presents a crime predicti...
详细信息
This paper examines the convergence of cloud computing, facts science, and facts engineering, providing a primer for college kids getting into those fields. The examine highlights the synergistic courting among those ...
详细信息
Every day the modern world is moving towards digitalization and cashless transactions are becoming more common, credit cards are rapidly becoming more popular. Online and offline purchases using credit cards have beco...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
暂无评论