Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Ghada Eltaweel"'
Publikováno v:
Computer Systems Science and Engineering. 45:167-181
Publikováno v:
International Journal of Computer Network and Information Security. 9:1-10
Autor:
Ashraf Khaled Helmy, Ghada ElTaweel
Publikováno v:
International Journal of Information Technology and Computer Science. 8:33-45
Publikováno v:
International Journal of Information Technology and Computer Science. 8:1-12
Publikováno v:
Medical Big Data and Internet of Medical Things ISBN: 9781351030380
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::824791ee4f417cf84e3bf6919bfb7d7d
https://doi.org/10.1201/9781351030380-6
https://doi.org/10.1201/9781351030380-6
Autor:
Ghada ElTaweel, Ashraf Khaled Helmy
Publikováno v:
IET Image Processing. 7:407-414
Image fusion combines information from multiple images of the same scene to obtain a composite image which is more suitable for further image processing tasks. This study presented an image fusion scheme based on the modified dual pulse coupled neura
Publikováno v:
International Journal of Image and Graphics. 10:575-587
With the increasing demand of visual surveillance systems, human recognition at a distance has gained extensive research interest. Gait is a potential behavioral feature to identify humans based on their motion. This paper describes a new scheme for
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319212050
ECC
ECC
Currently smartphone’ users run many crucial applications (such as banking and emails) which contains a very confidential information. To secure this information, the built in sensors equipped with smartphone devices can be utilized. In this paper,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac738d09635071505ab47bb8f6ec95f3
https://doi.org/10.1007/978-3-319-21206-7_22
https://doi.org/10.1007/978-3-319-21206-7_22
Publikováno v:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ISBN: 9783662436158
Bio-inspiring Cyber Security and Cloud Services
Bio-inspiring Cyber Security and Cloud Services
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they provide access to other data, on cloud for example, and to services somewhere on the Internet. Mobile authentication aims to protect against unauthorized ac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d61022a1b3f169a6da33e9e06021d8db
https://doi.org/10.1007/978-3-662-43616-5_16
https://doi.org/10.1007/978-3-662-43616-5_16