Search Results - stolen base
-
1
Use of AI to Recreate and Repatriate Lost, Destroyed or Stolen Paintings: The 1785 Parisian Salon Case Study
Published 2023“…However, the study identifies a critical issue where successive AI-based inpainting iterations lead to a degradation in color fidelity and detail precision. …”
Get full text
Get full text
Get full text
-
2
Understanding disagreement within the majority about action to atone for past wrongs
Published 2013“…Action was analyzed as a function of national identity, opinion-based group identity, group-based guilt, political orientation, and collective efficacy. …”
Get full text
-
3
-
4
Filter-based fingerprint feature extraction
Published 2009“…Nevertheless, these technologies imply risk of data being forgotten, lost or even stolen. A secure and confidential biometric authentication method is the utilization of fingerprints. …”
Get full text
Get full text
-
5
Development of GSM-Based Vehicle Anti-Theft System
Published 2006“…The statistic of the vehicle gets stolen or vandalized increases at an alarming rate every year. …”
Get full text
Get full text
-
6
-
7
-
8
QR-code based E-wallet System using Android platform
Published 2019“…After that, to design and implement a mobile application which is QR-code based and lastly, to conduct testing for the proposed system to ensure the accuracy. …”
Get full text
Get full text
-
9
Development Of A Pressure-Based Typing Biometrics System For User Authentication
Published 2005“…Additionally, passwords can be easily cracked, guessed, stolen or deliberately shared. To minimize the risk of intrusion, keystroke dynamics can be used to complement this popular authentication method. …”
Get full text
Get full text
-
10
-
11
-
12
Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
Published 2018“…The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). …”
Get full text
Get full text
-
13
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
Published 2005“…This research is conducted using Java-based platform and using Bluetooth features to synchronizes the data. …”
Get full text
-
14
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
Published 2019“…Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. …”
Get full text
-
15
Automated access of laboratory system using IOT-based face recognition / Nor Faezah Abdul Razak
Published 2020“…Old system tend to have some insufficiencies that are likely to be stolen by unauthorized parties or forgotten by the owners. …”
Get full text
-
16
RFID Based Livestock Management
Published 2009“…Based on IDTechEx, the largest market using RFID technology is animal, food and livestock. …”
Get full text
Get full text
-
17
Design and Development of Cost-Effective Automatic Location Identification for Campus Monitoring
Published 2010“…Therefore, an system needs to be deployed within the campus that makes it possible to track down equipments once they are stolen. The purpose of this research work is to design and develop automatic location identification (ALI) system for security purpose based on the GPS technology. …”
Get full text
Get full text
-
18
Missing the boat: Indonesian Kompas newspaper’s 1995 reporting on asylum seekers from East Timor
Published 2018“…The Indonesian government reported that a group of people had stolen the Tasi Diak (Good Sea) 119, a wooden fishing boat, from the port of Hera in May 1995. …”
Get full text
Get full text
-
19
Cancellable biometrics and annotations on BioHash
Published 2008“…Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem. …”
Get full text
Get full text
-
20
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
Published 2018“…This paper describes the preliminary research and application of fuzzy logic based controller for braking system of stolen vehicle. …”
Get full text
Get full text