Almarashdeh et al., 2018 - Google Patents
An overview of technology evolution: Investigating the factors influencing non-bitcoins users to adopt bitcoins as online payment transaction methodAlmarashdeh et al., 2018
View HTML- Document ID
- 7062807047079552883
- Author
- Almarashdeh I
- Bouzkraoui H
- Azouaoui A
- Youssef H
- Niharmine L
- Rahman A
- Yahaya S
- Atta A
- Egbe D
- Murimo B
- Publication year
- Publication venue
- Journal of Theoretical and Applied Information Technology
External Links
Snippet
Today, the technological revolution influenced the methods of payment. Most interesting is that our perception towards money is changing, and we are beginning to try forms of money which have not been used or seen previously in history of human such as cryptocurrency or …
- 238000005516 engineering process 0 title description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/627—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/629—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of extracted features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/03—Detection or correction of errors, e.g. by rescanning the pattern
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Almarashdeh et al. | An overview of technology evolution: Investigating the factors influencing non-bitcoins users to adopt bitcoins as online payment transaction method | |
Groh et al. | Deepfake detection by human crowds, machines, and machine-informed crowds | |
Pena et al. | Bias in multimodal AI: Testbed for fair automatic recruitment | |
Song et al. | Machine learning models that remember too much | |
Bahnsen et al. | Classifying phishing URLs using recurrent neural networks | |
Fleuret et al. | Comparing machines and humans on a visual categorization test | |
Qolomany et al. | Trust-based cloud machine learning model selection for industrial IoT and smart city services | |
WO2020236651A1 (en) | Identity verification and management system | |
Pleshakova et al. | Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends | |
Fang et al. | Subjectivity grouping: Learning from users' rating behavior | |
Adeyemo et al. | Stain: Stealthy avenues of attacks on horizontally collaborated convolutional neural network inference and their mitigation | |
Mahmood et al. | Optimizing Network Security with Machine Learning and Multi-Factor Authentication for Enhanced Intrusion Detection | |
Schryen et al. | Development of two novel face-recognition CAPTCHAs: a security and usability study | |
Wong | BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces | |
Garabato et al. | AI-based user authentication reinforcement by continuous extraction of behavioral interaction features | |
Rajagopal et al. | Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0 | |
Jesmithaa et al. | Detecting phishing attacks using Convolutional Neural Network and LSTM | |
Shah et al. | DeepMUI: A novel method to identify malicious users on online social network platforms | |
Naz et al. | A comprehensive survey on social engineering-based attacks on social networks | |
Tsinganos et al. | CSE-ARS: Deep learning-based late fusion of multimodal information for chat-based social engineering attack recognition | |
Sakthipriya et al. | Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features | |
Ibrahim et al. | Towards Developing a Metaverse Authentication Model for Mobile Features. | |
Li et al. | Identifying high quality carding services in underground economy using nonparametric supervised topic model | |
Wilhoit et al. | Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs | |
Dwivedi et al. | Improving Network Security with Gradient Boosting from KDD Cup Dataset |