Abstract. In this study, we evaluate the use of height for biometric identification of residents, by mounting ultrasonic distance sensors above the doorways in a home. Height senso...
Vijay Srinivasan, John A. Stankovic, Kamin Whiteho...
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
The innate verbosity of the Extensible Markup Language remains one of its main weaknesses, especially when large XML documents are concerned. This problem can be solved with the a...
Przemyslaw Skibinski, Szymon Grabowski, Jakub Swac...
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Noble forces in image segmentation based on active contours models are proposed for capturing objects in the image. Contemplating the common functionality of forces in previous ac...