-
5681
Research and prospect of standard for biometric multi-modal fusion used with mobile devices
Published 2021-01-01“…Aiming at the problem of inconsistent biometric multi-modal fusion technology framework for mobile devices and lack of standards, a unified technical framework of multi-modal fusion standards was proposed.Firstly, the current status of standardization related to biometric used with mobile device was analyzed.Secondly, the local recognition and remote recognition application modes of mobile device biometrics standards were studied, and then four sub-multimodal fusion classification methods of multi-feature, multi-algorithm, multi-instance, and multi-sensor were analyzed and proposed.Then, four levels of multi-modal fusion were researched and proposed: sample-level fusion, feature-level fusion, score-level fusion, and decision-level fusion, and a standard technical framework for biometric multi-modal fusion for mobile devices was proposed.Finally, prospects for the application of biometric multi-modal fusion technology were given.…”
Get full text
Article -
5682
Unraveling the AMPK-SIRT1-FOXO Pathway: The In-Depth Analysis and Breakthrough Prospects of Oxidative Stress-Induced Diseases
Published 2025-01-01“…In oxidative stress conditions, AMPK, an energy sensor, activates SIRT1, which in turn stimulates the FOXO transcription factor. …”
Get full text
Article -
5683
AMPK-Dependent Metabolic Regulation by PPAR Agonists
Published 2010-01-01“…It is noteworthy that PPARα or PPARγ agonists have pharmacological effects by modulating the activity of AMPK, which is a key cellular energy sensor. However, the role of AMPK in the metabolic effects of PPAR agonists has not been thoroughly focused. …”
Get full text
Article -
5684
A hybrid indoor localization algorithm based on RSSI and inertial navigation
Published 2017-10-01“…To cater for the requirements of high-precision indoor localization algorithms,a hybrid indoor localization algorithm based on received signal strength identification (RSSI) and inertial navigation was proposed.This algorithm used fingerprint identification algorithm to localize the agents,based on the RSSI values of ZigBee nodes in wireless sensor network.The algorithm combined the inertial information provided by inertial measurement units (IMU),to correct the RSSI localization results.This algorithm used Kalman filter and adopted state equations to describe the dynamic change rules of agents’ positions,thus it achieved a hybrid localization algorithm which relied WSN localization first and IMU last.Simulations evaluate that the proposed algorithm can improve the localization performances of algorithms which adopt RSSI localization and inertial navigation individually,and can greatly improve localization accuracy.…”
Get full text
Article -
5685
Electrochemical Detection of Iron in a Lixiviant Solution of Polluted Soil Using a Modified Glassy Carbon Electrode
Published 2012-01-01“…The results not only revealed the modified electrode with nanotubes, polyaniline and platinum nanoparticles were the most selective and sensitive, but also provided an electroanalytic tool to analyze iron in lixiviated samples of polluted soil. The proposed iron sensor exhibited a linear response between 0 and 10 mM with detection and quantification limits of 0.003 and 0.012 μM, respectively. …”
Get full text
Article -
5686
Graphene/Gold Nanocomposites-Based Thin Films as an Enhanced Sensing Platform for Voltammetric Detection of Cr(VI) Ions
Published 2014-01-01“…A highly sensitive and selective Cr(VI) sensor with graphene-based nanocomposites film as an enhanced sensing platform is reported. …”
Get full text
Article -
5687
Robust Spectrum Sensing Demonstration Using a Low-Cost Front-End Receiver
Published 2015-01-01“…Finally, the spectrum sensor developed is implemented on an Android device and SS implementation is demonstrated using a smartphone.…”
Get full text
Article -
5688
A Proposed IoT-Enabled Smart Waste Bin Management System and Efficient Route Selection
Published 2019-01-01“…This article presents the smart waste management architecture for smart cities and efficient routing technique considering least delay for the architecture. In wireless sensor networks, end-to-end delay is one of the important Quality of Services (QoS) parameter to overcome delay in data communication. …”
Get full text
Article -
5689
Game Edukasi Pengenalan Sistem Isyarat Bahasa Indonesia (SIBI) Menggunakan Myo Armband pada Arsitektur Client Server
Published 2022-06-01“…The platform can recognize hand movements obtained from Myo Armband sensor data. Applications on the front-end side can use the platform features through the provided Application Programming Interface (API). …”
Get full text
Article -
5690
Rancang Bangun Alat Pengenal Finger Vein Menggunakan Raspberry Pi dengan Metode Convolutional Neural Network (CNN)
Published 2024-10-01“…Pengenalan sidik jari dan telapak tangan mengharuskan pengguna untuk menyentuh permukaan sensor. Dengan cara ini, pengguna dapat merasa tidak nyaman dan risiko penyebaran virus atau bakteri sangat tinggi, juga akurasi pendeteksian dapat dipengaruhi oleh faktor-faktor seperti kulit berkeringat dan kering serta distorsi kulit. …”
Get full text
Article -
5691
RoboGait: sistema robótico no invasivo para el análisis de la marcha humana
Published 2023-10-01“…Actualmente, los sistemas utilizados en laboratorios para analizar la marcha se basan en técnicas marcadores o sensores colocados sobre el cuerpo del paciente, lo que resulta en un proceso que requiere un tiempo largo de preparación y calibración, así como la incomodidad que causa a los pacientes tener dispositivos colocados por el cuerpo. …”
Get full text
Article -
5692
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01“…I-PRESENT was a lightweight SPN block cipher for resource-constraint environments such as RFID tags and sensor networks.The biclique structures of I-PRESENT with sieve-in-the-middle technique was an constracted.The biclique cryptanalysis schemes on full-round I-PRESENT-80 and I-PRESENT-128 were proposed for the first time.The results show that the data complexity of the biclique cryptanalysis on I-PRESENT-80 and I-PRESENT-128 is 2 <sup>26</sup> and 2<sup>36</sup> chosen ciphertexts respectively,and the time complexity on them is 2 <sup>79.48</sup> and 2 <sup>127.33</sup> encryptions respectively.The time and data complexity are better than that of the exhaustive attack.In addition,the time complexity on them can be reduced to 2 <sup>78.61</sup> and 2<sup>126.48</sup> encryptions by using related-key technology of I-PRESENT.…”
Get full text
Article -
5693
An Improved Test Selection Optimization Model Based on Fault Ambiguity Group Isolation and Chaotic Discrete PSO
Published 2018-01-01“…Sensor data-based test selection optimization is the basis for designing a test work, which ensures that the system is tested under the constraint of the conventional indexes such as fault detection rate (FDR) and fault isolation rate (FIR). …”
Get full text
Article -
5694
Research on a Rotating Machinery Fault Prognosis Method Using Three-Dimensional Spatial Representations
Published 2016-01-01“…Due to the requirement for a short and rapid response, it is important to study robust sensor data representation schemes. However, the conventional holospectrum defined by one-dimensional or two-dimensional methods does not sufficiently present this information in both the frequency and time domains. …”
Get full text
Article -
5695
PFM:a SMS4 algorithm against high-order power analysis attacks
Published 2010-01-01“…A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method(PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.…”
Get full text
Article -
5696
Classification and Localization of Mixed Sources after Blind Calibration of Unknown Mutual Coupling
Published 2019-01-01“…In practice, an ideal sensor array without the effects of unknown mutual coupling is rarely satisfied, which degrades the performance of most high-resolution algorithms. …”
Get full text
Article -
5697
The Design of a Noise Detection Automatisation Tool in Library – Based on Internet of Things
Published 2022-12-01“…The Arduino processed the data from the sound sensor through the Edge Impulse platform. Suppose a sound with a value exceeds 0.6 and takes more than 10 seconds. …”
Get full text
Article -
5698
Monitoring LST-NDVI Relationship Using Premonsoon Landsat Datasets
Published 2020-01-01“…The present study monitors the interrelationship of land surface temperature (LST) with normalized difference vegetation index (NDVI) in Raipur City of India using premonsoon Landsat satellite sensor for the season of 2002, 2006, 2010, 2014, and 2018. …”
Get full text
Article -
5699
Who Is Interested in Purchasing Smart Irrigation Systems?
Published 2019-09-01“… Water scarcity concerns have led to revolutionary new smart technologies for residential landscape irrigation, including evapotranspiration and soil-moisture sensor systems. The adoption of smart irrigation technologies into residential landscapes, however, has been slow. …”
Get full text
Article -
5700
Episodic Reasoning for Vision-Based Human Action Recognition
Published 2014-01-01“…While most solutions rest on sensor value interpretations and video analysis applications, few have realized the importance of incorporating common-sense capabilities to support the recognition process. …”
Get full text
Article