An adaptive and viable face identification for Android mobile devices
| Main Authors: | Mehraj, Tehseen, Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Anwar, Farhat, Jusoh, Ahmad Zamani |
|---|---|
| Other Authors: | Singh, Amit Kumar |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer, Cham
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/75993/ http://irep.iium.edu.my/75993/1/75993_An%20adaptive%20and%20viable%20face%20identification.pdf |
Similar Items
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
A study on performance evaluation of conventional cache replacement algorithms: A review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Bandwith conservation framework for mobile cloud computing: challenges and solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
CDR analysis using big data technology
by: Elagib, Sara B., et al.
Published: (2016)
by: Elagib, Sara B., et al.
Published: (2016)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Automatic Number Plate Recognition on android platform: With some Java code excerpts
by: ., Abdul Mutholib, et al.
Published: (2016)
by: ., Abdul Mutholib, et al.
Published: (2016)
QoS oriented mapReduce optimization for hadoop based
bigData application
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Development of heuristic task scheduling algorithm in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Performance evaluation of an improved admission control for differentiated MPLS-TE tunnels
by: Mahmoud, Omer, et al.
Published: (2014)
by: Mahmoud, Omer, et al.
Published: (2014)
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
FRGS-13-081-0322/ design and modelling of novel dynamic bandwidth aggregation scheme in heterogeneous wireless network (hwn) for mission critical applications
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
A compendious study of online payment systems:Past developments, present impact, and future
considerations
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Radio Access Technology (RAT) selection mechanism using
TOPSIS method in Heterogeneous Wireless Networks (HWN)
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
A real-time integrated fire detection and alarm (FDA) system for network based building automation
by: Anwar, Farhat, et al.
Published: (2017)
by: Anwar, Farhat, et al.
Published: (2017)
Battery optimizer for android device
by: Noor Suzieana, Suhaimi
Published: (2019)
by: Noor Suzieana, Suhaimi
Published: (2019)
Performance analysis of constrained device virtualization algorithm
by: Haseeb, Shariq, et al.
Published: (2020)
by: Haseeb, Shariq, et al.
Published: (2020)
Similar Items
-
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019) -
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018) -
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016) -
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018) -
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)