Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Improving The Classification Of Tiny Images For Forensic Analysis, Roba Jafar Alharbi
Improving The Classification Of Tiny Images For Forensic Analysis, Roba Jafar Alharbi
Theses and Dissertations
Forensics can be defined as the approach that connects with and uses in governments and different organizations in order to detect any malicious activity. Digital forensics has become an essential approach to cyber investigation. Image forensics is one of the most beneficial ways that are used in digital forensics in order to help investigators in cybercrimes. Therefore, investigators can discover some new evidence besides what is already available on their systems when they use some digital forensics techniques. This thesis focuses on identifying an image based on its contents, especially tiny images. We investigated ways to improve the performance of …
Building Datasets From Publicly Accessible Social Media Images For Biometric Analysis, Giordano Roberto Benitez Torres
Building Datasets From Publicly Accessible Social Media Images For Biometric Analysis, Giordano Roberto Benitez Torres
Theses and Dissertations
The world is developing at a rapid pace, and some of its advancement can be accredited to technological innovations that are affecting many aspects of society. A field within computer science that is increasingly reaching many industries is Biometrics, specifically the area face recognition. Researchers, scientists, and organizations actively try to improve the performance of tools and algorithms. Nevertheless, for it to occur, there is a need for high-quality datasets to test and develop new techniques. Never had humanity, in the course of the history of civilization, produced massive amounts of data as it currently does. Social media networks play …
A Taxonomy Of Security Features For The Comparison Of Home Automation Protocols, Amal Abdullah Alasiri
A Taxonomy Of Security Features For The Comparison Of Home Automation Protocols, Amal Abdullah Alasiri
Theses and Dissertations
Both academia and industry environments are getting significant attention to the Internet-of-Things (IoT) technology because of the unlimited benefits that this technology can bring to the environment. The technology presents a vision of a future Internet where computing systems, nodes, users, and daily nodes such as sensors and actuators cooperate with unprecedented convenience and economic benefits. The umbrella of IoT covers various applications as the following (smart home, transport, community, and national applications). Most of the studies focus on its technical and usage more than the security perspective. Especially, there are limited papers focus on smart home protocols security regarding …
Increasing User Confidence In Privacy-Sensitive Robots, Raniah Abdullah Bamagain
Increasing User Confidence In Privacy-Sensitive Robots, Raniah Abdullah Bamagain
Theses and Dissertations
As the deployment and availability of robots grow rapidly, and spreads everywhere to reach places where they can communicate with humans, and they can constantly sense, watch, hear, process, and record all the environment around them, numerous new benefits and services can be provided, but at the same time, various types of privacy issues appear. Indeed, the use of robots that process data remotely causes privacy concerns. There are some main factors that could increase the capability of violating the users’ privacy, such as the robots’ appearance, perception, or navigation capability, as well as the lack of authentication, the lack …