identification process
Recently Published Documents


TOTAL DOCUMENTS

629
(FIVE YEARS 234)

H-INDEX

21
(FIVE YEARS 6)

Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 110
Author(s):  
Yating Qu ◽  
Ling Xing ◽  
Huahong Ma ◽  
Honghai Wu ◽  
Kun Zhang ◽  
...  

Identifying offline entities corresponding to multiple virtual accounts of users across social networks is crucial for the development of related fields, such as user recommendation system, network security, and user behavior pattern analysis. The data generated by users on multiple social networks has similarities. Thus, the concept of symmetry can be used to analyze user-generated information for user identification. In this paper, we propose a friendship networks-based user identification across social networks algorithm (FNUI), which performs the similarity of multi-hop neighbor nodes of a user to characterize the information redundancy in the friend networks fully. Subsequently, a gradient descent algorithm is used to optimize the contribution of the user’s multi-hop nodes in the user identification process. Ultimately, user identification is achieved in conjunction with the Gale–Shapley matching algorithm. Experimental results show that compared with baselines, such as friend relationship-based user identification (FRUI) and friendship learning-based user identification (FBI): (1) The contribution of single-hop neighbor nodes in the user identification process is higher than other multi-hop neighbor nodes; (2) The redundancy of information contained in multi-hop neighbor nodes has a more significant impact on user identification; (3) The precision rate, recall rate, comprehensive evaluation index (F1), and area under curve (AUC) of user identification have been improved.


2022 ◽  
Vol 1 (4) ◽  
pp. 841-846
Author(s):  
Rafif Muhammad Irdian ◽  
Rafi Fredy Septianto ◽  
Aksen Winarto

Along with the increasing crime rate of data theft that occurs, it takes a good room security system to maintain data security for a particular agency or organization. Something A good security system is a security system that can be monitored and controlled remotely using the internet or better known as IoT (Internet of Things). In this thesis will designed an IoT-based room security system using the Android application, this system works using several modules including RFID (Radio Frequency Identification) module, camera module and door lock solenoid. The RFID card in this RFID Module functions as an identification process for people who want to enter into the room. In addition, this RFID module also functions as a trigger for the camera to work to take pictures a picture of the person who wants to enter the room. The data obtained from the two modules later will be sent into the Android application. The admin of the room can carry out the verification process to allow or deny people who want to enter the room. The results of testing this system can be runs well when the internet speed of the access point is fast and stable, but less optimal when the internet speed of the access point is running slowly.


2022 ◽  
Vol 9 (1) ◽  
pp. 3-8
Author(s):  
Khan Niaz Khan ◽  
Mohammad Ali ◽  
Muhammad Zahid ◽  
Wasim Ahmad

OBJECTIVES: The objective of the study was to assess the diversity of mosquitoes in various towns of the southern belt of KPK. METHODOLOGY: This was a descriptive study that was conducted in numerous towns of Western belt of Khyber Pakhtunkhwa. The study areas were Darra Adam Khel, District Kohat, District Karak, District Banu, District D.I. Khan and newly merged districts Mir Ali and Miranshah. From each study site, the samples were collected randomly. The sample collection was done through survey and area visits whereas; the identification process was done in a parasitology laboratory of Hayatabad-Peshawar. Sampling was done from June 2016 to May 2017. RESULTS: A total of 2150 adult mosquitoes were gathered and collected from 42 different locations of the southern belt of KPK and were identified. Based on their identification, 5 genera of the mosquitoes were recognized which were Culex, Anopheles, Psorophora, Aedes and Uranotenia. Culex was found to be most dominant in all the visited areas with a percentage of 12.65 in Miranshah followed by 11.81 in Mirali, 7.16 in Karak, 6.88 in Darra Adam Khel, 6.69 in D.I.Khan, 6.41 in Kohat and 5.11 in Bannu respectively. The results of our findings also revealed the presence of Culex genera in all the habitats and remained the dominant genera among the others followed by Anopheles and Psorophora. Aedes was found in the habitat of plants and grasses etc. whereas Uranotenia was found in marsh/swampy areas as well as in plants/grasses habitat only. CONCLUSION: The outcomes reveal that a climate shifting and extensive urbanization process is enforcing the diversity of mosquitos’ fauna in the southern belt of KPK.


2021 ◽  
Vol 5 (4) ◽  
pp. 558
Author(s):  
Fajar Septian ◽  
Bobi Agustian

Augmented Reality (AR) technology provides opportunities for science and engineering. AR also has great opportunities in the world of education, which is to provide and display additional information in the form of 3D objects, video, sound, and text on an object. Smartphone software developers have developed Augmented reality technology that was previously developed on PC devices where this technology utilizes the existing camera on a smartphone. With this situation, AR technology has the opportunity to be used in the development of a media for recognizing hijaiyah letters, so that children will be happier learning because of its attractive appearance and teachers or parents can more easily teach lessons to their children. The way to use it is as follows: first, the user puts a registered and printed marker, second, the smartphone camera identifies (tracking) the marker. If the marker is invalid, the user repeats the identification process. If the marker is valid and identified, the marker will display the hijaiyah letter object in three-dimensional form. Third, users can understand the shape and pronunciation of hijaiyah letters by touching the virtual button on the marker


2021 ◽  
Vol 4 (1) ◽  
pp. 13-18
Author(s):  
Dewy Widiawati ◽  
Engga Marlinsa ◽  
Mardiyati M ◽  
Erik Perdana Putra

This study aims to determine the types of mangrove plants in the Bhadrika tourist park, Bengkulu Province. This study uses the method of observation. The data obtained are then immediately taken to the laboratory for identification. The identification process by observing the roots, stems, leaves, flowers and fruit.  The mangroves found were, Avicennia alba, Lumnitzera racemosa, Excoecaria agallocha, Aegiceras corniculatum, Bruguiera cylindrical. There were 5 types of mangroves in the Bhadrika Tourism Park which belonged to 5 families.


2021 ◽  
Author(s):  
Marothu Vamsi Krishna ◽  
Kantamaneni Padmalatha ◽  
Gorrepati Madhavi

Metabolic stability of a compound is an important factor to be considered during the early stages of drug discovery. If the compound has poor metabolic stability, it never becomes a drug even though it has promising pharmacological characteristics. For example, a drug is quickly metabolized in the body; it does not have sufficient in vivo exposure levels and leads to the production of toxic, non-active or active metabolites. A drug is slowly metabolized in the body it could remain longer periods in the body and lead to unwanted adverse reactions, toxicity or may cause drug interactions. Metabolic stability assay is performed to understand the susceptibility of the compound to undergo biotransformation in the body. Intrinsic clearance of the compound is measured by metabolic stability assays. Different in vitro test systems including liver microsomes, hepatocytes, S9 fractions, cytosol, recombinant expressed enzymes, and cell lines are used to investigate the metabolic stability of drugs. Metabolite profiling is a vital part of the drug discovery process and LC–MS plays a vital role. The development of high-resolution (HR) MS technologies with improved mass accuracy, in conjunction with novel data processing techniques, has significantly improved the metabolite detection and identification process. HR-MS based data acquisition (ion intensity-dependent acquisition, accurate-mass inclusion list-dependent acquisition, isotope pattern-dependent acquisition, pseudo neutral loss-dependent acquisition, and mass defect-dependent acquisition) and data mining techniques (extracted ion chromatogram, product ion filter, mass defect filter, isotope pattern filter, neutral loss filter, background subtraction, and control sample comparison) facilitate the drug metabolite identification process.


2021 ◽  
Vol 16 (1) ◽  
pp. 6-12
Author(s):  
Ahmad Yudianto ◽  
Arofi Kurniawan ◽  
Toetik Koesbardiati ◽  
Achmad Faisol ◽  
Fery Setiawan ◽  
...  

Background: The non-invasive cff-DNA and siblings DNA methods are the latest breakthroughs in the forensic identification process. The use of cff-DNA and siblings DNA as non-invasive techniques in the forensic identification process has, hitherto, not been widely proven. Methods and Materials: This was an analytic observational study. The sample of this study consisted of peripheral blood of women in the second trimester of pregnancy and their two biological children. The kinship analysis was carried out through siblings' DNA and cff-DNA from the mothers through CODIS STR loci (CSF1PO, THO1, TPOX, and vWA). Results: The means of allele sharing between full siblings in loci CSF1PO, THO1, TPOX, and vWA were 0 (13.75%), 1 (44.75%), and 2 (41.50%). The allele sharing found in the study is in line with the one in previous research conducted by Wenk (1998) and the theory proposed by O'Connor (2011), indicating that one allele sharing dominates, contrasting with the finding of previous research conducted by Sosiawan (2020) revealing that 2-allele sharing was more superior. The variation is caused by the ethnicity having a different genetic contribution among the population. The variation can be attributed to historical and demographical processes leading to genetic drift. Conclusion: The mean of SI in 1 allele sharing in CODIS STR loci (CSF1PO, THO1, TPOX, and vWA) has the highest value of 44.5%. The use of cff-DNA of pregnant women as one of the non-invasive techniques can serve as an alternative material in a paternity test.


2021 ◽  
Vol 1 (2) ◽  
Author(s):  
Dagmara Nowak-Senderowska ◽  
Michał Patyk

The paper highlights the results of a study that examined the employees' expertise andawareness of occupational hazards in their work environment. The research involved a survey conductedin the form of a short questionnaire among employees responsible for loading and hauling of excavatedmaterial in an opencast mine. Among 23 major hazards that were thus identified, there were global hazards(affecting the entire mining process) as well as local, task-specific hazards. Depending on the number ofresponses, 10 local and 3 global hazards were identified in the analyzed area, involving noise, stress anddust. Active participation of the crew in the risk identification process helped in the assessment of theircriticality levels, according to employees carrying out various task, highlighting the benefits of suchapproach for effective work safety management in a mining company. The conducted researchdemonstrated yet another goal to be achieved - i.e. the comparison of criticality levels of hazards asidentified by employees and those reported in occupational risk assessment reports in the mine.


2021 ◽  
Author(s):  
Gergana Varbanova ◽  

Internet communication and digital technologies are an integral part of our daily lives. The provision of electronic public services, the growing volume of electronic transactions and electronic turnover raise a number of issues with the security of information and electronic identification of entities, so that there is no doubt about the participants in the relevant proceedings or in the digital trade. The question is what is the analogue of the ID card, which should be used to identify individuals and other entities in a digital environment. The report examines the application of electronic identification and electronic identity in the context of personal data security and the possibilities to minimize the misuse of personal data through the electronic identification process.


Sign in / Sign up

Export Citation Format

Share Document