1 - 5 of 5 articles
Accessing offshore cloud or remote computers via the Internet has become popular. However, in some countries, governmental agencies or organizations may suddenly block international communication links. Temporary blocks or more permanent barriers as China’s Golden Shield (GS) are known to...
With the increase in adoption of biometric data for various identification processes, the need for efficient indexing techniques is also on the rise as it is computationally impossible to match the query template against every enrolled entry in the database. In this paper, we have proposed two...
Internet of Things (IoT) paradigm is going to imbue and become ubiquitous in everyday living, ranging from generic household, healthcare, public utility to defence applications. The IoT as a technology realm is witnessing advancement at a lightning speed. Consequently, there is a growing number...
Human face detection has become an area of interest in various biometric applications such as crowd surveillance, human–computer interaction, and many security related areas. It is a major field of current research because there is no deterministic algorithm to find the face(s) in a given image....
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.