Evaluation of classifiers in a pressure and latency-based typing biometric system
System authentication in present time relies on validation by some sort of a password or Personal Identification Number (PIN). However, if an intruder discovers this password or PIN, the user’s account can be easily compromised. Biometric systems rely on user authentication based on some physical...
| Main Authors: | Moez Khan, Imran, ., Imama, Ushama, K. M., Aibinu, Abiodun Musa, Lai, Weng Kin |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1776/ http://irep.iium.edu.my/1776/1/Evaluation_of_Classifiers_in_a_Pressure_and.pdf |
Similar Items
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Detection of vascular intersection in retina fundus
by: Iqbal, Muhammad Imran, et al.
Published: (2008)
by: Iqbal, Muhammad Imran, et al.
Published: (2008)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Optimal model order selection for transient error autoregressive moving average (TERA) MRI reconstruction method
by: Najeeb, Athaur Rahman, et al.
Published: (2008)
by: Najeeb, Athaur Rahman, et al.
Published: (2008)
A novel clustering based genetic algorithm for route optimization
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
Design of an intelligent robotic donationbox a case study
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Factors effecting fixed-line telecom services customer retention: A study of Pakistan
by: Rind, M. Malook, et al.
Published: (2016)
by: Rind, M. Malook, et al.
Published: (2016)
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework
by: Rind, M. Malook, et al.
Published: (2015)
by: Rind, M. Malook, et al.
Published: (2015)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Investigation of forces affecting dust particle alignment in cross polarization
by: Musa, Abdulwaheed, et al.
Published: (2014)
by: Musa, Abdulwaheed, et al.
Published: (2014)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018)
by: Khan, N., et al.
Published: (2018)
Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Energy efficiency in virtualized data center
by: Karamat Khan, Tehmina, et al.
Published: (2018)
by: Karamat Khan, Tehmina, et al.
Published: (2018)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
Differential image compression for telemedicine: a novel approach
by: Khan, Adnan Alam, et al.
Published: (2011)
by: Khan, Adnan Alam, et al.
Published: (2011)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Detecting changes in context using time series analysis of social network
by: Nusratullah , Kajal, et al.
Published: (2015)
by: Nusratullah , Kajal, et al.
Published: (2015)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Spectrum analysis of physiological signals of human activities
by: Kazmi, Syed Absar, et al.
Published: (2015)
by: Kazmi, Syed Absar, et al.
Published: (2015)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
Poincare based PPG signal analysis for varying physiological states
by: Kazmi , Syed Absar, et al.
Published: (2016)
by: Kazmi , Syed Absar, et al.
Published: (2016)
Forensic analysis of offline signature using multi-layer perception and random forest
by: Shah, Abdul Salam, et al.
Published: (2017)
by: Shah, Abdul Salam, et al.
Published: (2017)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Similar Items
-
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015) -
Detection of vascular intersection in retina fundus
by: Iqbal, Muhammad Imran, et al.
Published: (2008) -
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011) -
Optimal model order selection for transient error autoregressive moving average (TERA) MRI reconstruction method
by: Najeeb, Athaur Rahman, et al.
Published: (2008) -
A novel clustering based genetic algorithm for route optimization
by: Aibinu, Abiodun Musa, et al.
Published: (2016)