|
|
|
Deema Almaskati, Sharareh Kermanshachi, Apurva Pamidimukkala, Karthikeyan Loganathan and Zhe Yin
Hazard identification is a fundamental step in safety management that has the potential to reduce the number and severity of occupational injuries on construction sites. Researchers have identified and evaluated some of the hazards, but few have extensiv...
ver más
|
|
|
|
|
|
|
Gloria Bordogna, Paola Carrara, Luca Frigerio and Simone Lella
The current practice of users searching for different types of geo-resources in a geographic area and wishing to identify the most convenient routes for visiting the most relevant ones, requires the iterative formulation of several queries: first to iden...
ver más
|
|
|
|
|
|
|
Wen-Chieh Chen, Chun-Liang Lin, Yang-Yi Chen and Hsin-Hsu Cheng
Unmanned aerial vehicles (UAVs) are becoming popular in various applications. However, there are still challenging issues to be tackled, such as effective obstacle avoidance, target identification within a crowd, and specific target tracking. This paper ...
ver más
|
|
|
|
|
|
|
Alla Vinokhodova, Vadim Gushin, Polina Kuznetsova and Anna Yusupova
Detection of the extent of common values in a cohesive space crew has become an important trend in modern space psychology. It is known from the works of Ch. Osgood that the semantic differential scale is a reliable way to obtain objective information on...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Naman Bhalotia, Mohnish Kumar, Abdalla Alameen, Hitesh Mohapatra and Manjur Kolhar
The life expectancy of the elderly has substantially increased compared to earlier times. The primary factors are greater awareness of nutrition, the environment, and personal hygiene. Advances in science and technology have also extended the lifespans o...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Jin-A Lee and Keun-Chang Kwak
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du...
ver más
|
|
|
|
|
|
|
Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis and Stefanos Gritzalis
Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users...
ver más
|
|
|
|
|
|
|
Yu-Shiuan Tsai and Si-Jie Chen
In terms of gait recognition, face recognition is currently the most commonly used technology with high accuracy. However, in an image, there is not necessarily a face. Therefore, face recognition cannot be used if there is no face at all. However, when ...
ver más
|
|
|
|