Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sajaad Ahmed Lone"'
Autor:
Ajaz Hussain Mir, Sajaad Ahmed Lone
Publikováno v:
International Journal of Pervasive Computing and Communications. 18:437-459
Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication sch
Publikováno v:
SN Computer Science. 3
Autor:
Sajaad Ahmed Lone, Riaz A. Khan
Publikováno v:
Multimedia Tools and Applications. 80:7039-7061
The privacy and security of identity documents like Passports, PAN cards, Driving License as well as other important personal documents like academic degree certificates are now at an all-time high, given how easy and cheap the new technologies make
Publikováno v:
Computers in biology and medicine. 150
The recent investigation has started for evaluating the human respiratory sounds, like voice recorded, cough, and breathing from hospital confirmed Covid-19 tools, which differs from healthy person's sound. The cough-based detection of Covid-19 also
Autor:
Sajaad Ahmed Lone, Saima Maqbool
Publikováno v:
International Journal of Wireless and Microwave Technologies. 5:15-23
In this paper we have proposed a method to make a base for the monitoring and Control of systems. The monitoring and Control of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechani
Autor:
Sajaad Ahmed Lone, Saima Maqbool
Publikováno v:
International Journal of Computer Applications. 117:28-31
In this paper we have proposed a method to make a base for the monitoring of systems. The monitoring of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechanical device. Every person
Publikováno v:
Indonesian Journal of Electrical Engineering and Computer Science. 13:982
The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persi