Search Results - stolen base

Refine Results
  1. 1

    Use of AI to Recreate and Repatriate Lost, Destroyed or Stolen Paintings: The 1785 Parisian Salon Case Study by O'Brien, C., Hutson, J., Olsen, T., Ratican, J.

    Published 2023
    “…However, the study identifies a critical issue where successive AI-based inpainting iterations lead to a degradation in color fidelity and detail precision. …”
    Get full text
    Get full text
    Get full text
  2. 2

    Understanding disagreement within the majority about action to atone for past wrongs by Hartley, Lisa, McGarty, C., Donaghue, N.

    Published 2013
    “…Action was analyzed as a function of national identity, opinion-based group identity, group-based guilt, political orientation, and collective efficacy. …”
    Get full text
  3. 3
  4. 4

    Filter-based fingerprint feature extraction by Amnani, Ali

    Published 2009
    “…Nevertheless, these technologies imply risk of data being forgotten, lost or even stolen. A secure and confidential biometric authentication method is the utilization of fingerprints. …”
    Get full text
    Get full text
  5. 5

    Development of GSM-Based Vehicle Anti-Theft System by Hamid, Khairul Hamzani

    Published 2006
    “…The statistic of the vehicle gets stolen or vandalized increases at an alarming rate every year. …”
    Get full text
    Get full text
  6. 6
  7. 7
  8. 8

    QR-code based E-wallet System using Android platform by Kayalvily, Tabianan, Siti Qalillah Adawiah, Abdul Rahman, Deshinta, Arrova Dewi

    Published 2019
    “…After that, to design and implement a mobile application which is QR-code based and lastly, to conduct testing for the proposed system to ensure the accuracy. …”
    Get full text
    Get full text
  9. 9

    Development Of A Pressure-Based Typing Biometrics System For User Authentication by Loy, Chen Change

    Published 2005
    “…Additionally, passwords can be easily cracked, guessed, stolen or deliberately shared. To minimize the risk of intrusion, keystroke dynamics can be used to complement this popular authentication method. …”
    Get full text
    Get full text
  10. 10
  11. 11
  12. 12

    Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing by Chee, Kong Yik

    Published 2018
    “…The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). …”
    Get full text
    Get full text
  13. 13

    Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni by Che Khosni, Farahani

    Published 2005
    “…This research is conducted using Java-based platform and using Bluetooth features to synchronizes the data. …”
    Get full text
  14. 14

    Multi-point collaborative authentication method based on user image intelligent collection in the internet of things by Li, Yunfa, Tu, Yifei, Lu, Jiawa

    Published 2019
    “…Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. …”
    Get full text
  15. 15

    Automated access of laboratory system using IOT-based face recognition / Nor Faezah Abdul Razak by Abdul Razak, Nor Faezah

    Published 2020
    “…Old system tend to have some insufficiencies that are likely to be stolen by unauthorized parties or forgotten by the owners. …”
    Get full text
  16. 16

    RFID Based Livestock Management by Hayu Rahiza, Ramli

    Published 2009
    “…Based on IDTechEx, the largest market using RFID technology is animal, food and livestock. …”
    Get full text
    Get full text
  17. 17

    Design and Development of Cost-Effective Automatic Location Identification for Campus Monitoring by Abidin, W.A.W.Z, Othman, A.K., Hong Ping, Kismet, Masri, T., Zamhari, N.

    Published 2010
    “…Therefore, an system needs to be deployed within the campus that makes it possible to track down equipments once they are stolen. The purpose of this research work is to design and develop automatic location identification (ALI) system for security purpose based on the GPS technology. …”
    Get full text
    Get full text
  18. 18

    Missing the boat: Indonesian Kompas newspaper’s 1995 reporting on asylum seekers from East Timor by Hearman, Vannessa

    Published 2018
    “…The Indonesian government reported that a group of people had stolen the Tasi Diak (Good Sea) 119, a wooden fishing boat, from the port of Hera in May 1995. …”
    Get full text
    Get full text
  19. 19

    Cancellable biometrics and annotations on BioHash by TEOH, A, KUAN, Y, LEE, S

    Published 2008
    “…Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem. …”
    Get full text
    Get full text
  20. 20

    Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking by Kahtan, Hasan, Wan Nor Ashikin, Wan Ahmad Fatthi, Azma, Abdullah, Mansoor, Abdulletee, Noor Aishah, Rosli

    Published 2018
    “…This paper describes the preliminary research and application of fuzzy logic based controller for braking system of stolen vehicle. …”
    Get full text
    Get full text