بایگانی برچسب برای: Survey

Age-Synthesis-and-Estimation-via-Faces.[taliem.ir]

Age Synthesis and Estimation via Faces: A Survey

Human age, as an important personal trait, can be directly inferred by distinct patterns emerging from the facial appearance. Derived from rapid advances in computer graphics and machine vision, computer-based age synthesis and estimation via faces have become particularly prevalent topics recently because of their explosively emerging real-world applications, such as forensic art, electronic customer relationship management, security control and surveillance monitoring, biometrics, entertainment, and cosmetology. Age synthesis is defined to rerender a face image aesthetically with natural aging and rejuvenating effects on the individual face. Age estimation is defined to label a face image automatically with the exact age (year) or the age group (year range) of the individual face. Because of their particularity and complexity, both problems are attractive yet challenging to computer-based application system designers. Large efforts from both academia and industry have been devoted in the last a few decades. In this paper, we survey the complete state-of-the-art techniques in the face image-based age synthesis and estimation topics. Existing models, popular algorithms, system performances, technical difficulties, popular face aging databases, evaluation protocols, and promising future directions are also provided with systematic discussions.
Mobile Security Catching Up[taliem.ir]

Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices

We are currently moving from the Internet society to a mobile society where more and more access to information is done by previously dumb phones. For example, the number of mobile phones using a full blown OS has risen to nearly 200% from Q3/2009 to Q3/2010. As a result, mobile security is no longer immanent, but imperative. This survey paper provides a concise overview of mobile network security, attack vectors using the back end system and the web browser, but also the hardware layer and the user as attack enabler. We show differences and similarities between “normal” security and mobile security, and draw conclusions for further research opportunities in this area .
Age Synthesis and Estimation via Faces[taliem.ir]

Age Synthesis and Estimation via Faces: A Survey

Human age, as an important personal trait, can be directly inferred by distinct patterns emerging from the facial appearance. Derived from rapid advances in computer graphics and machine vision, computer-based age synthesis and estimation via faces have become particularly prevalent topics recently because of their explosively emerging real-world applications, such as forensic art, electronic customer relationship management, security control and surveillance monitoring, biometrics, entertainment, and cosmetology. Age synthesis is defined to rerender a face image aesthetically with natural aging and rejuvenating effects on theindividual face. Age estimation is defined to label a face image automatically with the exact age (year) or the age group (year range) of the individual face. Because of their particularity and complexity, both problems are attractive yet challenging to computer-based application system designers. Large efforts from both academia and industry have been devoted in the last a few decades. In thispaper, we survey the complete state-of-the-art techniques in the face image-based age synthesis and estimation topics. Existing models, popular algorithms, system performances, technical difficulties, popular face aging databases, evaluation protocols, and promising future directions are also provided with systematic discussions.
A Survey of Security and Privacy in Big Data[taliem.ir]

A Survey of Security and Privacy in Big Data

Big data has been arising a growing interest in both scientific and industrial fields for its potential value. However, before employing big data technology into massive applications, a basic but also principle topic should be investigated: security and privacy. In this paper, the recent research and development on security and privacy in big data is surveyed. First, the effects of characteristics of big data on information security and privacy are described. Then, topics and issues on security are discussed and reviewed. Further, privacy-preserving trajectory data publishing is studied due to its future utilization, especially in telecom operation.
Impact of enterprise resource planning systems on[taliem.ir]

Impact of enterprise resource planning systems on management control systems and firm performance

In this study, we extend existing research on enterprise resource planning systems by exploring the effects of enterprise system adoption on subsequent non-financial and financial performance of a firm. Specifically, we investigate the role of formal and informal management control systems as mechanisms which mediate the effect of enterprise resource planning systems adoption on firm performance. Our empirical analyses are based on survey data drawn from 70 Finnish business units. Overall, our findings demonstrate that formal types of management control systems act as intervening variables mediating the positive lagged effect between enterprise systems adoption and non-financial performance. Informal types of management control systems, however, do not show similar mediating effects. We also predict and find a significant relationship between non-financial and financial firm performance. These results are important because the evidence on the joint roles of enterprise systems and management control system on improving the firm performance is very limited in prior literature. Our results show that the use of enterprise systems results in improved firm performance in the long run, and that more formal than informal types of management controls help firms achieve future performance goals.