Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Automation | 5 |
Identification | 5 |
Information Technology | 5 |
Models | 3 |
Computer Networks | 2 |
Computer Security | 2 |
Computer Software | 2 |
Data Collection | 2 |
Design | 2 |
Man Machine Systems | 2 |
Visual Aids | 2 |
More ▼ |
Author
Daniel J. Carragher | 1 |
Daniel Sturman | 1 |
Esperon, Rubelyn M. | 1 |
Ippoliti, Dennis | 1 |
Olipas, Cris Norman P. | 1 |
Peter J. B. Hancock | 1 |
Sun, Shaohui | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daniel J. Carragher; Daniel Sturman; Peter J. B. Hancock – Cognitive Research: Principles and Implications, 2024
The human face is commonly used for identity verification. While this task was once exclusively performed by humans, technological advancements have seen automated facial recognition systems (AFRS) integrated into many identification scenarios. Although many state-of-the-art AFRS are exceptionally accurate, they often require human oversight or…
Descriptors: Automation, Human Body, Man Machine Systems, Accuracy
Olipas, Cris Norman P.; Esperon, Rubelyn M. – Online Submission, 2020
This study aims to design and develop a Cashless Payment System with Automatic Identification and Data Collection (AIDC) technology in an educational institution in the Province of Nueva Ecija, Philippines to understand the processes and activities undertaken to develop the project. It utilizes a descriptive and developmental method of research…
Descriptors: Online Systems, Money Management, Banking, Automation
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Sun, Shaohui – ProQuest LLC, 2013
Urban reconstruction, with an emphasis on man-made structure modeling, is an active research area with broad impact on several potential applications. Urban reconstruction combines photogrammetry, remote sensing, computer vision, and computer graphics. Even though there is a huge volume of work that has been done, many problems still remain…
Descriptors: Automation, Visual Aids, Models, Buildings
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers