To see the other types of publications on this topic, follow the link: Click-points.

Journal articles on the topic 'Click-points'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Click-points.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

KumarSarohi, Harsh, and Farhat Ullah Khan. "Perception based Cued Click Points." International Journal of Computer Applications 70, no. 22 (2013): 29–33. http://dx.doi.org/10.5120/12201-8381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nandgaonkar, Mr Vikas, Nikita Dongre, and Priyanka Giri Diksha Hinge Ankita Kashid. "QR Code Based Secure Billing System for Shops using Cued Click Points." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 834–36. http://dx.doi.org/10.31142/ijtsrd23946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mhetre, Miss Deepika, Miss Komal Murkute, Miss Vishranti Kale,, Miss Apurva Kabra, and Prof Sonali Madankar. "M-Wallet Security using Cued Click Points." IOSR Journal of Computer Engineering 16, no. 2 (2014): 63–69. http://dx.doi.org/10.9790/0661-162106369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Horner, Bob. "Policy Points: Communication is a Click Away." Lighting Design + Application 41, no. 1 (2011): 30–31. https://doi.org/10.1177/036063251104100109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kiran, T. Ravi, P. Varaha Mounika, S. V. Vasavi Swapna, S. Satya Rao, and N. Raju. "Secure Password Authentication Approach using Cued Click Points." International Journal of Engineering Trends and Technology 10, no. 10 (2014): 478–81. http://dx.doi.org/10.14445/22315381/ijett-v10p292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ameen, J. Noorul, J. Jamal Mohamed, and N. Nilofer Begam. "Efficient Authentication Scheme Using PCCP." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 938–51. https://doi.org/10.5281/zenodo.14742817.

Full text
Abstract:
There is an increasing need to design and deploy multifeatured networking applications due to the fast growth of the Internet infrastructure and the use of large-scale complex applications. This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to i
APA, Harvard, Vancouver, ISO, and other styles
7

Saha, Hasi, Ganesh Chandra Saha, Roshidul H, and Zakirul Islsam. "USER AUTHENTICATION THROUGH CUED CLICK POINTS BASED GRAPHICAL PASSWORD." American Journal of Agricultural Science, Engineering, and Technology 3, no. 1 (2017): 1–12. http://dx.doi.org/10.54536/ajaset.v3i1.38.

Full text
Abstract:
User authentication is a fundamental component in most computer security context. In recent years, computer and network security has been formulated as a technical problem. A key area in security research is authentication which is the determination of whether a user should be allowed access to a given system or resource. In this respect, Authentication is a process by which a system verifies the identity of a user. Authentication may also be generalized by saying that “to authenticate” means “to authorize”. Users tend to pick passwords that can be easily guessed, on the other hand, if
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Yibo, Yanan Liu, Songzuo Liu, Gang Qiao, and Xin Qing. "Detecting and suppressing dolphin clicks in whistle signals using adaptive matched filtering and interpolation algorithm." Journal of the Acoustical Society of America 157, no. 6 (2025): 4057–68. https://doi.org/10.1121/10.0036828.

Full text
Abstract:
This paper describes a method for removing click disturbances from dolphin whistle signals. The algorithm is based on click end point detection, disturbance removal, and missing whistle segment interpolation, and enables both click suppression and whistle recovery from within mixed signals. Considering the impact of dolphin whistles on click detection, a Gabor filter is used to preprocess the spectrogram of the mixed signals. An adaptive matched filtering algorithm based on the Teager–Kaiser energy operator is then applied to detect the click end points, allowing the clicks to be removed from
APA, Harvard, Vancouver, ISO, and other styles
9

N, Narayanan Prasanth, Azarudeen K, Gulam Ahamed Kabeer M, and Gulam Peer Mohamed J. "Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points." i-manager's Journal on Software Engineering 8, no. 3 (2014): 26–30. http://dx.doi.org/10.26634/jse.8.3.2809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sahu, Saraswati B., and Angad Singh. "Secure User Authentication & Graphical Password using Cued Click-Points." International Journal of Computer Trends and Technology 18, no. 4 (2014): 156–60. http://dx.doi.org/10.14445/22312803/ijctt-v18p137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hassan Zali, Yakubu, Gregory Maksha Wajiga, Abubakar Abdullahi Faru, Yusuf Musa Malgwi, and Adamu Liman Mohammed. "Enhancing Data Warehouse Security: An Encrypted Cued-Click-Points Authentication Approach." International Journal of Development Mathematics (IJDM) 1, no. 3 (2024): 186–95. http://dx.doi.org/10.62054/ijdm/0103.14.

Full text
Abstract:
Text passwords and other traditional security measures have been the mainstay of current data warehouse content security techniques. Due to the growing computational capability of information systems, security requirements, especially for the selection of secure text passwords, have changed throughout time. Because database administrators are either unaware of these changes or are overburdened by the magnitude of the adjustments necessary to remedy them, these vulnerabilities are typically invisible to them. As a result, research on usable authentication schemes have picked up steam, with the
APA, Harvard, Vancouver, ISO, and other styles
12

Northcott, Celine, Rachel Curtis, Svetlana Bogomolova, et al. "Seasonal Differences in the Cost and Engagement of Facebook Advertisements for a Physical Activity Smartphone App." American Journal of Health Promotion 35, no. 6 (2021): 803–8. http://dx.doi.org/10.1177/0890117121997304.

Full text
Abstract:
Purpose: To evaluate the performance of Facebook advertisements for a physical activity smartphone app at different times of the year. Design: A repeated cross-sectional study examined the cost and engagement levels of advertisements during 3 time points: Post-Easter April-May 2019, Pre-Summer October 2019, and New Year January 2020 . Setting: Advertisements were delivered on Facebook. Subjects: The target population was Australian females aged 25-60 years. Measures: Cost was evaluated in terms of reach per dollar. Engagement was evaluated in terms of click-through and app downloads per reach.
APA, Harvard, Vancouver, ISO, and other styles
13

Srinivas, Devi. "Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points." IOSR Journal of Computer Engineering 12, no. 2 (2013): 39–46. http://dx.doi.org/10.9790/0661-1223946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ashok, P. "Dynamic Cryptographic Algorithm to Provide Password Authentication using Cued Click Points." International Journal of Informatics and Communication Technology (IJ-ICT) 6, no. 2 (2017): 123. http://dx.doi.org/10.11591/ijict.v6i2.pp123-128.

Full text
Abstract:
Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new authentication. In this paper, we have proposed a more advanced password authentication method yet a simple one which gives a tough competition for the attacker to break the password. For this, we are providing a special key-display interface to assist the modified cued c
APA, Harvard, Vancouver, ISO, and other styles
15

Nayak, Atish Dipakbhai, and Rajesh Bansode. "Performance analysis and evaluation of secure password persuasive cued click points." International Journal of Pervasive Computing and Communications 12, no. 4 (2016): 408–20. http://dx.doi.org/10.1108/ijpcc-07-2016-0040.

Full text
Abstract:
Purpose The purpose of this paper is to increase security using persuasive cued click points (PCCP) techniques and to make a system to provide security from the malware, key loggers and attacks. Design/methodology/approach The work methodology comprises two major phases. In phase one, the PCCP take place with the registration and login process done. It also includes text-based password which hides the character of password to protect from shoulder surfing attack. In phase two, the work includes background services which protect from key loggers. Findings Secure password persuasive cued click p
APA, Harvard, Vancouver, ISO, and other styles
16

Nayak, Atish, and Rajesh Bansode. "Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points." Procedia Computer Science 79 (2016): 553–60. http://dx.doi.org/10.1016/j.procs.2016.03.070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Shang, Mi Gu, Sara Garzandat, Xiao Wei Sun, and Renaud Bachelot. "8‐2: The micro‐scale adsorption of QDs on select surface by click chemistry." SID Symposium Digest of Technical Papers 55, S1 (2024): 80–82. http://dx.doi.org/10.1002/sdtp.17001.

Full text
Abstract:
QDs’ adsorption on multi‐surface is one of the key points to achieve on‐chip nano‐source. By click chemistry between surface functionalization layer and QDs, QDs were adsorbed on the target surface. This method could achieve small size, stable performance and high efficiency at the same time. Two kinds of surface functionalization material, with similar structure, were used to compare the QDs adsorption ability. DCOOH, the material with click chemistry possibility, exhibit 3‐time stronger adsorption ability comparing the DNO2.
APA, Harvard, Vancouver, ISO, and other styles
18

Gopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.

Full text
Abstract:
Authentication is vital for maintaining system secu- rity. Graphical password-based authentication systems provide a promising alternative to traditional authentication methods such as alphanumeric or text-based passwords. Conventional authentication systems are susceptible to brute force attacks, dictionary attacks, password guessing and user memory fatigue. Users create a personalized password by selecting a sequence of images or points in an image grid, which enhances security due to the complexity of graphical choices over traditional textual passwords. Graphical Password Based Authenticat
APA, Harvard, Vancouver, ISO, and other styles
19

Abhishek, Narayan Shah, Anand Dipti, Samanta Sabyasachi, and Dey Dipankar. "Graphical Password Authentication System Using Modified Intuitive Approach." International Journal of HIT Transaction on ECCN Vol. 7, no. 2A (2021) (2021): 64–71. https://doi.org/10.5281/zenodo.5893206.

Full text
Abstract:
B. Tech Student, Haldia Institute of Technology, Dept. of IT, Haldia, WB, India Haldia Institute of Technology, Dept. of IT, Haldia, WB, India Global Institute of Science and Technology, Haldia, WB, India In today’s world everything we use needs security, especially when we are using something on internet. For security purpose, we use text passwords as it is the most popular user authentication method, but have security and user friendly problems. To address this problem, some researchers have developed authentication methods that use pictures as passwords. Graphical passwords offer anot
APA, Harvard, Vancouver, ISO, and other styles
20

Lakshmi, Y. Sravana. "Evaluation of a Knowledge Based Authentication Mechanism through Persuasive Cued Click Points." International Journal of Computer Applications Technology and Research 4, no. 9 (2015): 633–39. http://dx.doi.org/10.7753/ijcatr0409.1001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mr., Vikas Nandgaonkar, Dongre Nikita, and Giri |. Diksha Hinge |. Ankita Kashid Priyanka. "QR Code Based Secure Billing System for Shops using Cued Click Points." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 834–36. https://doi.org/10.31142/ijtsrd23946.

Full text
Abstract:
In today's Mall shopping system, the users usually visit the mall for shopping di erent products and spend their valuable time in searching the products and the products in their price range. After selecting the product the users have to wait in a long queue for billing which is another time consuming part of shopping, and moving the cart from one place to another place is another hectic task. In this system the user's time and searching for products in the entire mall increases. So, we are working on this system to avoid these drawbacks. The drawbacks in the existing system are, rstly
APA, Harvard, Vancouver, ISO, and other styles
22

Anitha, M., and G. Saranya. "User Privileged CAPTCHA as Graphical Password for Multistage Authentication." International Journal of Advance Research and Innovation 3, no. 1 (2015): 28–33. http://dx.doi.org/10.51976/ijari.311505.

Full text
Abstract:
Nowadays, user authentication is one of the important topics in information security. In today’s world the password security is very important. For password protection various techniques are available. Cued Click Points are a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images. The next image is based on the previous click-point. The passwords which are easy to memorize are chosen by the users and it becomes easy for attackers to guess it, but the passwords assigned by the strong system are difficult for
APA, Harvard, Vancouver, ISO, and other styles
23

Hande, Suraj, Nitin Dighade, Ruchal Bhusari, Mrunali Shende, and Prof Heena Agrawal. "Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA." IOSR Journal of Computer Engineering 16, no. 2 (2014): 124–28. http://dx.doi.org/10.9790/0661-1629124128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rangari, Mr Shantanu, and Prof K. R. Ingole. "Implementation of Graphical Password Authentication Technique for Security Using Cued Click Points Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1476–79. http://dx.doi.org/10.22214/ijraset.2022.41416.

Full text
Abstract:
Abstract: In today's world, most Internet applications still establish user authentication with a traditional text-based password. Designing a secure as well as user-friendly password-based method has long been on the agenda of security researchers. On the one hand, there are password manager programs that make it easy to create site-specific strong passwords from a single user's password to eliminate the memory burden caused by multiple passwords. We offer different levels of authentication such as Textual Authentication, Image Authentication and Audio Authentication to provide better securit
APA, Harvard, Vancouver, ISO, and other styles
25

Gore, Ruta. "Graphical Based Authentication System Using Keystroke Parameters and Cued Click- Points: A Survey." International Journal for Research in Applied Science and Engineering Technology 7, no. 1 (2019): 843–44. http://dx.doi.org/10.22214/ijraset.2019.1133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Balalaie, Saeed, Aref Vaezghaemi, Nahid Zarezadeh, Frank Rominger, and Hamid Bijanzadeh. "Catalyst-Free Synthesis of Fused Triazolo-Diazepino[5,6-b]Quinoline Derivatives via a Sequential Ugi-4CR–Nucleophilic Substitution–Intramolecular Click Reaction." Synlett 29, no. 08 (2018): 1095–101. http://dx.doi.org/10.1055/s-0036-1591531.

Full text
Abstract:
A convenient, post-transformational reaction has been ­developed for the construction of highly diversified quinoline-fused triazolo-diazepinones featuring four diversification points by employing a catalyst-free Ugi four-component–nucleophilic substitution–intra­molecular click cycloaddition sequence. This approach provides a wide scope of products with good yields and high bond-forming efficiency.
APA, Harvard, Vancouver, ISO, and other styles
27

Müller, Katharina, Frank Schmitz, Alfons Schnitzler, Hans-Joachim Freund, Gisa Aschersleben, and Wolfgang Prinz. "Neuromagnetic Correlates of Sensorimotor Synchronization." Journal of Cognitive Neuroscience 12, no. 4 (2000): 546–55. http://dx.doi.org/10.1162/089892900562282.

Full text
Abstract:
Sensorimotor synchronization tasks, in which subjects have to tap their finger in synchrony with an isochronous auditory click, typically reveal a synchronization error with the tap preceding the click by about 20 to 50 msec. Although extensive behavioral studies and a number of different explanatory accounts have located the cause of this so-called “negative asynchrony” on different levels of processing, the underlying mechanisms are still not completely understood. Almost nothing is known about the central processes, in particular, which sensory or motor events are synchronized by subjects.
APA, Harvard, Vancouver, ISO, and other styles
28

Castrillón-López, Wilson, Andrés F. Yepes, and Wilson Cardona-Galeano. "Synthesis and In Silico Drug-Likeness Modeling of 5-FU/ASA Hybrids." Molbank 2023, no. 4 (2023): M1745. http://dx.doi.org/10.3390/m1745.

Full text
Abstract:
A series of 5-FU-ASA hybrids were synthesized with good yields using click chemistry as the key step. The structures of these compounds were elucidated by spectroscopic analysis. Finally, an optimal pharmacokinetic profile was also estimated for each synthetized hybrid. Taken together, hybrids 4a–h could be used as starting points for further pharmacological studies concerning therapeutic cancer intervention.
APA, Harvard, Vancouver, ISO, and other styles
29

Abuthaheer, A., N. S. Jeya Karthikka, and T. M. Thiyagu. "Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication." International Journal of Computer Applications 87, no. 2 (2014): 45–49. http://dx.doi.org/10.5120/15184-3535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chiasson, Sonia, Elizabeth Stobert, Alain Forget, Robert Biddle, and Paul C. Van Oorschot. "Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism." IEEE Transactions on Dependable and Secure Computing 9, no. 2 (2012): 222–35. http://dx.doi.org/10.1109/tdsc.2011.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Clara, García-Astrain, Munduate Kizkitza González, Gurrea Tania, et al. "Maleimide-grafted cellulose nanocrystals as cross-linkers for bionanocomposite hydrogels." Carbohydrate Polymers 149, no. 20 (2016): 94–101. https://doi.org/10.1016/j.carbpol.2016.04.091.

Full text
Abstract:
This article deals with the preparation of bionanocomposite hydrogels from natural polymers and nanoentities, an emerging class of materials for biotechnological and biomedical applications. Herein, the applicability of the Diels-Alder “click” reaction to the design of bionanocomposite hydrogels from furan modified gelatin using maleimide-functionalized cellulose nanocrystals as multifunctional cocross-linkers is demonstrated. The functionalization of cellulose nanocrystals with maleimide moieties was confirmed by XPS. The swelling and rheological properties of the resulting bionan
APA, Harvard, Vancouver, ISO, and other styles
32

Emmanuel, T. M., S. U. Suru, and B. T. Shehu. "Graphical Password Scheme Based on Color Hint Approach." International Journal of Research and Scientific Innovation XI, no. I (2024): 128–40. http://dx.doi.org/10.51244/ijrsi.2024.1101011.

Full text
Abstract:
Generally, textual password is the most used kind of authentication technique. However, this authentication type is vulnerable to a lot of attacks. Users using this kind of authentication techniques are at the risk of exposing vital organizational data or even password to attacks such as phishing, shoulder surfing, brute force and dictionary attacks etc. This is the major reason why a new authentication type is required, in other to minimize these threats or attacks, graphical authentication techniques were developed. But this authentication also faces attacks such as shoulder surfing and gues
APA, Harvard, Vancouver, ISO, and other styles
33

Orie, Ọlanikẹ Ọla. "Pointing the Yoruba way." Gesture 9, no. 2 (2009): 237–61. http://dx.doi.org/10.1075/gest.9.2.04ori.

Full text
Abstract:
This paper gives a description of Yoruba pointing behavior, especially pointing as it relates to people in interaction contexts. First, it is shown that pointing is regulated by socio-cultural factors. Secondly, it is shown that non-manual points such as lip points are complex points which use the gaze as the primary pointer; other head-area gestures ‘switch on’ the deictic function of the gaze to pinpoint the specific referent in the discourse space. This paper also describes a form of pointing, termed ‘eye-click’, in which the eyes have both the function of gazing and ‘switching on’ the deic
APA, Harvard, Vancouver, ISO, and other styles
34

Collins, Rebecca A., Lee M. Ashton, Tracy L. Burrows, et al. "No Money No Time Culinary Nutrition Website eHealth Challenge: A Pre-Post Evaluation of Impact on Diet Quality, Food Expenditure, and Engagement." Nutrients 16, no. 17 (2024): 2950. http://dx.doi.org/10.3390/nu16172950.

Full text
Abstract:
No Money No Time (NMNT) is a culinary nutrition website designed to optimize diet quality. The primary aim was to evaluate the impact of an online targeted nutrition challenge email campaign that encouraged engagement with NMNT and goal setting to improve diet quality and weekly food expenditure. A secondary aim was to assess NMNT engagement. Australian adults ≥18 years were recruited to the eHealth nutrition challenge delivered via weekly emails. Diet quality was assessed using the Healthy Eating Quiz (HEQ) diet quality tool. Engagement was assessed using email open and click-through rates. I
APA, Harvard, Vancouver, ISO, and other styles
35

Martínez, Isabel Cecilia. "Music attending to linear constituent structures in tonal music." Music & Science 1 (January 1, 2018): 205920431878776. http://dx.doi.org/10.1177/2059204318787763.

Full text
Abstract:
This article investigates the perception of constituent linear structures of tonal musical pieces, using a divided attention paradigm combined with a click-detection technique. Two experiments were run so as to test whether the boundary of a linear constituent appears as a focal point in the perception of musical structure. In Experiment 1, musicians and non-musicians listened to open foreground prolongations in phrases with clicks located at different points of their constituent structures. Significant differences in response times were found that depended on click position in relation to the
APA, Harvard, Vancouver, ISO, and other styles
36

Miravalle, Augusto A., Joshua Katz, Derrick Robertson, et al. "CLICK-MS and MASTER-2 Phase IV trial design: cladribine tablets in suboptimally controlled relapsing multiple sclerosis." Neurodegenerative Disease Management 11, no. 2 (2021): 99–111. http://dx.doi.org/10.2217/nmt-2020-0059.

Full text
Abstract:
Cladribine tablets 10 mg (3.5 mg/kg cumulative dose over 2 years) are approved for the treatment of relapsing forms of multiple sclerosis (MS), including relapsing-remitting MS and active secondary progressive MS. However, real-world data on cladribine tablets are limited. CLICK-MS and MASTER-2 are single arm, observational, 30-month, Phase IV studies in the US evaluating the effectiveness and safety of cladribine tablets 3.5 mg/kg in patients with relapsing-remitting MS or active secondary progressive MS who had suboptimal response to prior injectable (CLICK-MS), or infusion/oral (MASTER-2) d
APA, Harvard, Vancouver, ISO, and other styles
37

Azcarraga, Judith, and Merlin Teodosia Suarez. "Recognizing Student Emotions using Brainwaves and Mouse Behavior Data." International Journal of Distance Education Technologies 11, no. 2 (2013): 1–15. http://dx.doi.org/10.4018/jdet.2013040101.

Full text
Abstract:
Brainwaves (EEG signals) and mouse behavior information are shown to be useful in predicting academic emotions, such as confidence, excitement, frustration and interest. Twenty five college students were asked to use the Aplusix math learning software while their brainwaves signals and mouse behavior (number of clicks, duration of each click, distance traveled by the mouse) were automatically being captured. It is shown that by combining the extracted features from EEG signals with data representing mouse click behavior, the accuracy in predicting academic emotions substantially increases comp
APA, Harvard, Vancouver, ISO, and other styles
38

SOWMIYA, M., R. ACKSHAYA, MACREEN M. INFANT, and T. NIVETHA. "Secure Online Banking using Cued Click Point Graphical Password Algorithm." International Journal of Innovative Science and Research Technology 7, no. 6 (2022): 826–29. https://doi.org/10.5281/zenodo.6809051.

Full text
Abstract:
This paper proposes a system to securely login to a console and transfer money using a graphical password. The proposed framework in this project includes extra pixel distinguishing proof framework, as well as proficient feasible client verification using numerous cryptographic basics, such as encryption. Cued Click Point graphical password algorithm is used to enhance the security and reduce the risk of data leakage and hacks. Customers only have to submit a one-time username and confirmation code and select points in image, therefore this proposed approach is very simple to understand and us
APA, Harvard, Vancouver, ISO, and other styles
39

Alves Gomes, Miguel, Richard Meyes, Philipp Meisen, and Tobias Meisen. "It’s Not Always about Wide and Deep Models: Click-Through Rate Prediction with a Customer Behavior-Embedding Representation." Journal of Theoretical and Applied Electronic Commerce Research 19, no. 1 (2024): 135–51. http://dx.doi.org/10.3390/jtaer19010008.

Full text
Abstract:
Alongside natural language processing and computer vision, large learning models have found their way into e-commerce. Especially, for recommender systems and click-through rate prediction, these models have shown great predictive power. In this work, we aim to predict the probability that a customer will click on a given recommendation, given only its current session. Therefore, we propose a two-stage approach consisting of a customer behavior-embedding representation and a recurrent neural network. In the first stage, we train a self-supervised skip-gram embedding on customer activity data.
APA, Harvard, Vancouver, ISO, and other styles
40

Boehnke, Susan E., and Dennis P. Phillips. "Auditory Saltation in the Vertical Midsagittal Plane." Perception 34, no. 3 (2005): 371–77. http://dx.doi.org/10.1068/p5140.

Full text
Abstract:
Auditory saltation is an illusion in which a train of clicks, the first half of which is presented at one location and the other half of which is presented from a second location, is perceived as originating not only from the anchor points, but also from locations between them. That is, intermediate members of the series of clicks have their spatial locations systematically misperceived. In the present study, auditory saltation was examined for the first time in the vertical midsagittal plane. Subjects rated the perceived continuity of motion for 8-click trains systematically varied in inter-c
APA, Harvard, Vancouver, ISO, and other styles
41

Keklik, Merve, Irem Akar, Binnur Aydogan Temel, Demet Karaca Balta, and Gokhan Temel. "Single‐chain polymer nanoparticles via click crosslinking and effect of photoinduced radical combination on crosslink points." Polymer International 69, no. 10 (2020): 1018–23. http://dx.doi.org/10.1002/pi.6057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mambu, Joe Yuan, Junior Lakat, and George Morris William Tangka. "Connecting Tutors and Students: A Mobile Application Designed with Design Thinking." CogITo Smart Journal 10, no. 2 (2024): 533–47. https://doi.org/10.31154/cogito.v10i2.814.533-547.

Full text
Abstract:
The rapid advancement of information technology has transformed education globally, but in regions like Manado, Indonesia, the lack of platforms connecting private tutors with students creates inefficiencies. Students face difficulties in finding affordable tutoring services, while tutors struggle with marketing and building trust. This study aims to design and evaluate the user interface (UI) and user experience (UX) of a mobile application addressing these challenges using the Design Thinking methodology. Through five stages—Empathize, Define, Ideate, Prototype, and Test—key pain points were
APA, Harvard, Vancouver, ISO, and other styles
43

Pinotti, Paolo. "Clicking on Heaven’s Door: The Effect of Immigrant Legalization on Crime." American Economic Review 107, no. 1 (2017): 138–68. http://dx.doi.org/10.1257/aer.20150355.

Full text
Abstract:
We estimate the effect of immigrant legalization on the crime rate of immigrants in Italy by exploiting an ideal regression discontinuity design: fixed quotas of residence permits are available each year, applications must be submitted electronically on specific “click days,” and are processed on a first come, first served basis until the available quotas are exhausted. Matching data on applications with individual-level criminal records, we show that legalization reduces the crime rate of legalized immigrants by 0.6 percentage points on average, on a baseline crime rate of 1.1 percent. (JEL J
APA, Harvard, Vancouver, ISO, and other styles
44

Zhou, Xiaoyu. "Predicting Click Behavior Based on Machine Learning Models." BCP Business & Management 44 (April 27, 2023): 270–78. http://dx.doi.org/10.54691/bcpbm.v44i.4822.

Full text
Abstract:
As businesses spend a great amount of advertising dollars each year and hope to achieve marketing objectives, advertising practitioners often advise them to understand customer behavior and customize target audience. This study gains information about click behavior and uses those to help brands make targeting decisions. In the study, a predictive analysis on whether a viewer clicks on the ad was conducted to build a model that forecasts user clicks and forms a list of potentially interested viewers. The predictive model included variables that mainly contained viewer information, such as ‘Dai
APA, Harvard, Vancouver, ISO, and other styles
45

Lapoule, Paul. "The French Grocery Retail Company Intermarché Develops the ‘Click and Drive’ Model." South Asian Journal of Business and Management Cases 3, no. 1 (2014): 65–76. http://dx.doi.org/10.1177/2277977914525294.

Full text
Abstract:
The purpose of this case study is to let the readers identify the key success factors of the French grocery retail companies’ drive-through model. A case study approach is used to describe clearly issues confronting Intermarché, the third largest French grocery retail company, to the important and fast drive-in model development. The large French grocery retailers are investing heavily in the ‘click and drive’ format in order to avoid having to make home deliveries and bear the substantial costs associated with the ‘last mile’. Investing in selected drive-in locations is a cheaper way for them
APA, Harvard, Vancouver, ISO, and other styles
46

Tang, Bin, Xia Meng, Fuliang Zhang, et al. "Theoretical and practical investigation into the use of a bio-inspired “click” mechanism for the flight motor of a micro air vehicle." International Journal of Micro Air Vehicles 9, no. 2 (2017): 136–45. http://dx.doi.org/10.1177/1756829317695562.

Full text
Abstract:
Recently, flapping wing micro air vehicles have received great attention with the drive to make smaller and smaller devices. This paper describes a theoretical investigation and subsequent practical implementation of a specific type of flight motor structure for this type of micro air vehicle that uses a “click” mechanism to improve mechanical efficiency. Diptera, which may use the mechanism, are the inspiration for this work. It builds on previous research into the “click” mechanism, which has been studied both from the biological and engineering points of view. It is difficult to capture the
APA, Harvard, Vancouver, ISO, and other styles
47

Chaturvedi, Smita, and Rekha Sharma. "Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard." Procedia Computer Science 45 (2015): 418–27. http://dx.doi.org/10.1016/j.procs.2015.03.172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jiang, Xiu Hong, Fu Hai Duan, and Rui Guo. "Research on Multi-Point Calibration and Touch Pressure of Touch-Screen." Applied Mechanics and Materials 198-199 (September 2012): 1290–93. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1290.

Full text
Abstract:
In view of the inaccuracy and low sensitivity of resistive touch-screen in small point target environment, two measures were proposed. First, based on the existing three-point calibration algorithm, more points were sampled to improve coordinate conversion precision, greedy algorithmm reduced the random calibration point set, and least squares algorithm fit the final calibration coefficients. Another measure was to utilize the touch pressure measurement and pressure threshold decision to remove invalid click. Finally, test results show that multi-point calibration with greedy algorithm can imp
APA, Harvard, Vancouver, ISO, and other styles
49

Ho, Yi-Jen (Ian), Sanjeev Dewan, and Yi-Chun (Chad) Ho. "Distance and Local Competition in Mobile Geofencing." Information Systems Research 31, no. 4 (2020): 1421–42. http://dx.doi.org/10.1287/isre.2020.0953.

Full text
Abstract:
The growing ubiquity of GPS-enabled smartphones has ushered in a new era of location-based services and online-to-offline commerce. Geofencing is one instance of this broader phenomenon, and it is being widely adopted in the context of retail, restaurant, entertainment, and other local services. By targeting users on mobile apps while they are in the vicinity of physical establishments, there is potential for higher levels of engagement and consumption of the products or services on offer. However, the level of consumer interest is likely to depend on distance from the establishment and local
APA, Harvard, Vancouver, ISO, and other styles
50

Vikhe, B. B., and Shabbir Ahmad. "System Security Using 3-Dimensional Password." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 08 (2015): 1966–69. https://doi.org/10.5281/zenodo.14789611.

Full text
Abstract:
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. pc world surroundings authentication plays a vital role for word. User authentication is one amongst the foremost vital procedures needed to access secure and confidential information. Authentication of users is sometimes achieved through text-based passwords. Therefore researchers of recent days have gone for different strategies wherever in graphical image square measure used as a word. Image based mostly authentication permits user to form graphical word that has benefits over text-based pass
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!