Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Black hole: A new heuristic optimization approach for data clustering
A Hatamlou - Information sciences, 2013 - Elsevier
Nature has always been a source of inspiration. Over the last few decades, it has stimulated
many successful algorithms and computational tools for dealing with complex and …
many successful algorithms and computational tools for dealing with complex and …
User identity verification via mouse dynamics
Identity theft is a crime in which hackers perpetrate fraudulent activity under stolen identities
by using credentials, such as passwords and smartcards, unlawfully obtained from …
by using credentials, such as passwords and smartcards, unlawfully obtained from …
Biometric template security: an overview
Purpose The security of the stored biometric template is itself a challenge. Feature
transformation techniques and biometric cryptosystems are used to address the concerns …
transformation techniques and biometric cryptosystems are used to address the concerns …
Using the idea of the sparse representation to perform coarse-to-fine face recognition
In this paper, we propose a coarse-to-fine face recognition method. This method consists of
two stages and works in a similar way as the well-known sparse representation method. The …
two stages and works in a similar way as the well-known sparse representation method. The …
Keystroke dynamics-based user authentication using long and free text strings from various input devices
Keystroke dynamics, which refers to the ty** pattern of an individual, has been highlighted
as a practical behavioral biometric feature that does not require any additional recognition …
as a practical behavioral biometric feature that does not require any additional recognition …
Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection
Keystroke dynamics has been used to strengthen password-based user authentication
systems by considering the ty** characteristics of legitimate users. The main problem with …
systems by considering the ty** characteristics of legitimate users. The main problem with …
Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features
Keystroke dynamics-based authentication (KDA) is one of the human behavioral biometric-
based user authentication methods based on the unique ty** pattern of a person …
based user authentication methods based on the unique ty** pattern of a person …
Arabic text clustering methods and suggested solutions for theme-based quran clustering: analysis of literature
Q Bsoul, R Abdul Salam, J Atwan… - Journal of Information …, 2021 - koreascience.kr
Text clustering is one of the most commonly used methods for detecting themes or types of
documents. Text clustering is used in many fields, but its effectiveness is still not sufficient to …
documents. Text clustering is used in many fields, but its effectiveness is still not sufficient to …