The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
After a decade of extensive research on application-specific wireless sensor networks (WSNs), the recent development of information and communication technologies makes it practical to realize the software-defined sensor networks (SDSNs), which are able to adapt to various application requirements and to fully explore the resources of WSNs. A sensor node in SDSN is able to conduct multiple tasks with...
Fingerprint biometric is one of the most successful biometrics applied in both forensic law enforcement and security applications. Recent developments in fingerprint acquisition technology have resulted in touchless live scan devices that generate 3D representation of fingerprints, and thus can overcome the deformation and smearing problems caused by conventional contact-based acquisition techniques...
Delaunay triangulation based structures, e.g., the Delaunay triangle and Voronoi neighbor structure, have been utilized in fingerprint authentication due to their desirable features in terms of dealing with non-linear distortion and spurious and missing minutiae. However, no existing research has shed light on the effect of spurious and missing minutiae on Delaunay triangulation when it is applied...
Host-based intrusion detection systems (HIDSs), especially anomaly-based, have received much attention over the past few decades. Over time, however, the existing data sets used for evaluation of a HIDS have lost most of their relevance due to the substantial development of computer systems. To fill this gap, ADFA Linux data set (ADFA-LD) is recently released, which is composed of thousands of system...
Fingerprint has been one of the most successful biometrics applied in both forensic law enforcement and security applications. Fingerprint acquisition, for many years, has been accomplished by first pressing a finger on a hard plane and then converting the image into a digital form. Recent developments in fingerprint acquisition technology have resulted in touchless live scan devices that generate...
Multiple targets tracking is a popular application with huge potentials in many practical areas, such as military air combat and civilian surveillance. Recent years, sensor networks, comprising of a large number of cheap, portable and tiny sensors, have attracted a lot of research interests in many disciplines. Alternative forms of sensors such as camera, can provide rich and vivid observation information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.