Browse Items (4 total)

4_A+Biometric+Authentication+Scheme+to+Enhance.pdf
Access control and security within higher education institutions are of paramount importance in safeguarding sensitive information and resources. Conventional authentication methods, such as passwords and identification cards, have proven susceptible…

3_Fortifying+Connectivity+A+Hybrid+Algorithm.pdf
Bluetooth technology has become an integral part of our daily lives, providing wireless connectivity and seamless communication between wide ranges of devices. Bluetooth uses a master-slave architecture, where one device acts as the master, and the…

2_Fraud+Detection+in+Motor+Insurance+Claims+Using.pdf
Fraudulent claims have been a big drawback in motor insurance despite the insurance industry having vast amounts of motor claims data. Analyzing this data can lead to a more efficient way of detecting reported fraudulent claims. The challenge is how…

1_Identification+of+Medical+Mask+Use+by+Applying+the+Convolutional.pdf
Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-COV-2) causes global pandemics and makes countries around the world lock down for tourists. This action is required to prevent the spread of viruses that take 14 days to disappear. SARS-COV-2 can…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2