Skip to main content

Home/ Groups/ CSIA 459
1More

Gait recognition without subject cooperation - 0 views

  •  
    This article addresses gait analysis from a non-lab perspective and looks at real work applicability.
1More

Baseline Results for the Challenge Problem of Human ID Using Gait Analysis - 0 views

  •  
    This article addresses the difficulties in gait analysis due to a lack of standards.
1More

A Study on Human Gait Analysis - 0 views

  •  
    This an article from the CCSEIT 2012 Conference. This paper examines the practicality of identifying people through their walking gait. Just a note, you'll need to click on the PDF icon to open the document up.
1More

Wireless BCI - 0 views

  •  
    This is a journal article detailing an experiment in which wireless rechargable devices were placed in non-human primates and successfully transmitted brain wave information without harming the animals.
1More

BCI in Virtual Reality - 1 views

  •  
    This is a journal article about an experiment in which participants used brainwaves to control actions in a virtual environment.
1More

PLOS ONE: Proprioceptive Feedback and Brain Computer Interface (BCI) Based Neuroprostheses - 0 views

  •  
    This is a journal article about an experiment regarding BCI, focusing on how feedback effects learning how to use brain controlled robotic limbs.

Fingerprint biometrics - 2 views

started by Justin Ohm on 07 Jul 13 no follow-up yet
1More

Fingerprint Biometrics Allow Hospitals to Securely Access e-Prescriptions, EHRs - 0 views

  •  
    By Brian T. Horowitz | Posted 2011-03-02 Email Print Biometrics firms Bio-key and Lumidigm aid Genesis HealthCare System in Ohio in implementing finger-based biometrics for e-prescriptions and electronic health records.
1More

ANNOTATED BIBLOGRAPHY SOURCES - 0 views

  •  
    A review of security on the cloud.
1More

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    How to secure a robust cloud storage with cryptography and access control.
1More

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    Article discusses ideas on securing processes on outsourcing into the cloud which may be a good ideas as most folk or companies will require a vendor to perform cloud services.
1More

Annotated Bibliography sources - 0 views

2More

A temporal cloak at telecommunication data rate - 1 views

  •  
    The authors describe the most recent interactions with temporal cloaking and how it hides events in time altered spatial gaps that are not detected. The thought is that data can be hidden in the gaps, and thus providing a practical method for securing information during transmissions.
  •  
    Lee thank you for the summary. I read the article and was pretty amazed at the possibility. I seemed like something from a science fiction movie or a Star Trek show. The minds that can study these things are absolutely amazing.
« First ‹ Previous 101 - 120 of 336 Next › Last »
Showing 20 items per page