Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Metric Identification of Vertices in Polygonal Cacti

    Xiujun Zhang1, Muhammad Salman2, Anam Rani3, Rashna Tanveer2, Usman Ali3,*, Zehui Shao4

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 883-899, 2023, DOI:10.32604/cmes.2023.025162 - 05 January 2023

    Abstract The distance between two vertices u and v in a connected graph G is the number of edges lying in a shortest path (geodesic) between them. A vertex x of G performs the metric identification for a pair (u, v) of vertices in G if and only if the equality between the distances of u and v with x implies that u = v (That is, the distance between u and x is different from the distance between v and x). The minimum number of vertices performing the metric identification for every pair of vertices in G defines the metric dimension of G. In this More >

  • Open Access

    ARTICLE

    Optimal Sensor Placement for Structural, Damage and Impact Identification: A Review

    V. Mallardo1,2, M.H. Aliabadi3

    Structural Durability & Health Monitoring, Vol.9, No.4, pp. 287-323, 2013, DOI:10.32604/sdhm.2013.009.287

    Abstract The optimum location of the sensors is a critical issue of any successful Structural Health Monitoring System. Sensor optimization problems encompass mainly three areas of interest: system identification, damage identification and impact identification. The current paper is intended as a review of the state of the art at the year 2012 and going back to 1990. The above topics have been dealt with in separate contexts so far but they contain interesting common elements to be exploited. More >

  • Open Access

    ABSTRACT

    Iris Biometrics Recognition Application in Security Management

    S.S. Chowhan1, G.N. Shinde2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.6, No.1, pp. 1-12, 2008, DOI:10.3970/icces.2008.006.001

    Abstract Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. Biometrics is gaining increasing attention in these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. The use of fingerprints, facial characteristics and other biometrics for identification is becoming more common. This paper overview best of Biometric application for security management. The acquisition of biometric data introduces human research and privacy concerns that must be addressed by the organizations. This More >

Displaying 1-10 on page 1 of 3. Per Page