E-Payment System to Reduce Use of Paper Money for Daily Transactions
This paper presents a framework of an E-payment system which can be used for daily petty
cash transactions. The framework involves communication of encrypted messages through …
cash transactions. The framework involves communication of encrypted messages through …
A racial recognition method based on facial color and texture for improving demographic classification
Facial recognition is one of the important techniques in the security and authentication
domain of the present time. Facial image recognition involves complex process which …
domain of the present time. Facial image recognition involves complex process which …
Xgboost-Based Multi-Steps Cybersecurity Attacks Detection Model
With the rapid growth of software and networks, the rate of cyber-attacks has increased
rapidly. As a result, the demand for a dependable and suitable Intrusion Detection System …
rapidly. As a result, the demand for a dependable and suitable Intrusion Detection System …
Electrocardiogram Signal Authentication System based on Deep Learning
S Maleki Lonbar, A Beigi, N Bagheri - Biannual Journal Monadi for …, 2024 - monadi.isc.org.ir
In the world of digital communication, authentication is an important concern and the need
for a safe and secure system increases the necessity of designing authentication systems …
for a safe and secure system increases the necessity of designing authentication systems …
Research on Legal Constraints of Individual Environmental Data Rights and Interests in Big Data Environment
Y **ao - Journal of Environmental and Public Health, 2022 - Wiley Online Library
Due to the practical needs, the lack of legal protection, and the lack of attention to these
three factors under the existing legal framework of personality rights, these factors together …
three factors under the existing legal framework of personality rights, these factors together …
Big data applications in transportation systems using the internet of things
The internet of things (IoT) is progressing towards the internet of everything (IoE). In the near
future, all smart physical entities are likely to be connected so that they can communicate …
future, all smart physical entities are likely to be connected so that they can communicate …
An overview of secure authentication methods using ECG biometrics with deep learning algorithms
N Mokhtari, A Safari, S Sadeghi - Biannual Journal Monadi for …, 2023 - monadi.isc.org.ir
Biometric systems are an important technique for user identification in today's world, which
have been welcomed due to their non-invasive nature and high resistance to forgery and …
have been welcomed due to their non-invasive nature and high resistance to forgery and …
PMS-Sharing: Framework for Automatically Authenticating users in a Group to Allow Sharing Storage
N Suthar, RK Yadav - 2020 5th International Conference on …, 2020 - ieeexplore.ieee.org
Cloud storage is a very famous buzz word nowadays. There are many cloud storage service
providers in the market and millions of mobile users are accessing cloud storage to store …
providers in the market and millions of mobile users are accessing cloud storage to store …
[PDF][PDF] 击 ﻖﯿﻤﻋ ﯼﺮﯿﮔﺩﺎﯾ ﻪﯾﺎﭘ ﺮﺑ ﺐﻠﻗ ﻥﺎﺑﺮﺿ ﻝﺎﻨﮕﯿﺳ ﺎﺑ ﺖﯾﻮﻫﺯﺍﺮﺣﺍ ﻢﺘﺴﯿﺳ
ECG ﺖﺳﺍ ﺭﺍﻮﺷﺩ - sid.ir
ﻦﺌﻤﻄﻣ ﻭ ﻦﻣﺍ ﻢﺘﺴﯿﺳ ﮏﯾ ﻪﺑ ﺯﺎﯿﻧ ﻭ ﺖﺳﺍ ﯽﻤﻬﻣ ﻪﻏﺪﻏﺩ ﺖﯾﻮﻫ ﺯﺍﺮﺣﺍ، ﻝﺎﺘﯿﺠﯾﺩ ﺕﺎﻃﺎﺒﺗﺭﺍ ﻪﯾﺎﭘ ﺮﺑ ﯼﺎﯿﻧﺩ ﺭﺩ ﻡﺎﺠﻧﺍ ﯼﺍﺮﺑ. ﺩﺮﺑ ﯽﻣ ﻻﺎﺑ
ﺍﺭ ﺖﯾﻮﻫ ﺯﺍﺮﺣﺍ ﯼﺎﻫ ﻢﺘﺴﯿﺳ ﯽﺣﺍﺮﻃ ﺕﺭﻭﺮﺿ ﻪﮐ ﺪﻨﮐ ﯽﻣ ﺪﯾﺪﺸﺗ ﺍﺭ ﻪﻏﺪﻏﺩ ﻦﯾﺍ ﺰﯿﻧ ﺮﺑﺍﺮﺑ ﺭﺩ ﻥﺩﻮﺑ ﻡﻭﺎﻘﻣ ﻭ ﻥﺩﻮﺑ ﻩﺪﻧﺯ ﺖﯿﺻﺎﺧ ﻦﺘﺷﺍﺩ …
ﺍﺭ ﺖﯾﻮﻫ ﺯﺍﺮﺣﺍ ﯼﺎﻫ ﻢﺘﺴﯿﺳ ﯽﺣﺍﺮﻃ ﺕﺭﻭﺮﺿ ﻪﮐ ﺪﻨﮐ ﯽﻣ ﺪﯾﺪﺸﺗ ﺍﺭ ﻪﻏﺪﻏﺩ ﻦﯾﺍ ﺰﯿﻧ ﺮﺑﺍﺮﺑ ﺭﺩ ﻥﺩﻮﺑ ﻡﻭﺎﻘﻣ ﻭ ﻥﺩﻮﺑ ﻩﺪﻧﺯ ﺖﯿﺻﺎﺧ ﻦﺘﺷﺍﺩ …