Πλοήγηση ανά Θέμα "Authentication"
Αποτελέσματα 21-28 από 28
-
A Survey on Mobile User Perceptions of Sensitive Data and Authentication Methods
(2020)The rapid evolution of mobile phone devices resulted in the conversion of a simple communication device to a complicated small portable computer offering a plethora of features and services. Sensitive data are now stored ... -
A Tetris-based legalization heuristic for standard cell placement with obstacles
(2018)Legalization techniques are used both as a final stage and potentially as part of an iterative process of a global cell placement algorithm that distributes cells over a chip area in order to optimize criteria such as ... -
The use of molecular markers in the verification of fish and seafood authenticity and the detection of adulteration
(2021)The verification of authenticity and detection of food mislabeling are elements that have been of high importance for centuries. During the last few decades there has been an increasing consumer demand for the verification ... -
The use of telomeric length as authenticity marker in fish and seafood - a new perspective in the detection of adulteration
(2022)In this review we propose the use of telomeric length (TL) as an authenticity marker that could provide an alternative method for differentiating fish and seafood samples or detecting fraud. Considering the ever-growing ... -
The use of various statistical methods for authenticity and detection of adulteration in fish and seafood
(2022)Various methodologies including genetic analyses, morphometrics, proteomics, lipidomics, metabolomics, etc. are now used or being developed to authenticate fish and seafood. Such techniques usually lead to the generation ... -
User authentication method and implementation using a three-axis accelerometer
(2010)The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis ... -
Using deep learning neural networks for ECG based authentication
(2017)Traditional password based authentication has been proven inadequate and the use of biometrics have provided multiple solutions through the past years. One of the most recent approaches to biometric authentication is using ... -
Variations on a Connectivity-based Legalizer for Standard Cell Design
(2021)Legalization is considered the most significant step in a placement correlated standard cell design flow as moving cells towards legal positions to avoid overlap among them may escalate the overall wire length. Monolithic ...