You are currently viewing a new version of our website. To view the old version click .

Electronics, Volume 10, Issue 4

February-2 2021 - 160 articles

Cover Story: A method for automatic analysis of dynamic handwritten signatures for biometric verification is presented in this article. Signature features are extracted using a neural network and transformed into a high-dimensional representation constrained to a unit hypersphere. The neural network was trained with the triplet loss algorithm, known from previous successful applications in face image biometrics. Signature feature vectors of different people are located far apart from one another in the latent space, whereas those belonging to the same person lie close together in a tight group. The proposed method’s effectiveness was verified on a new dataset of signatures acquired with a described biometric pen designed for biometric authentication applications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (160)

  • Feature Paper
  • Article
  • Open Access
9 Citations
5,352 Views
21 Pages

Customizable Vector Acceleration in Extreme-Edge Computing: A RISC-V Software/Hardware Architecture Study on VGG-16 Implementation

  • Stefano Sordillo,
  • Abdallah Cheikh,
  • Antonio Mastrandrea,
  • Francesco Menichelli and
  • Mauro Olivieri

23 February 2021

Computing in the cloud-edge continuum, as opposed to cloud computing, relies on high performance processing on the extreme edge of the Internet of Things (IoT) hierarchy. Hardware acceleration is a mandatory solution to achieve the performance requir...

  • Feature Paper
  • Article
  • Open Access
43 Citations
5,835 Views
17 Pages

Deep Learning Techniques for Android Botnet Detection

  • Suleiman Y. Yerima,
  • Mohammed K. Alzaylaee,
  • Annette Shajan and
  • Vinod P

23 February 2021

Android is increasingly being targeted by malware since it has become the most popular mobile operating system worldwide. Evasive malware families, such as Chamois, designed to turn Android devices into bots that form part of a larger botnet are beco...

  • Article
  • Open Access
3 Citations
2,516 Views
18 Pages

23 February 2021

In delay-tolerant networking (DTN), messages are delivered to destination nodes by using opportunistic contacts between contact nodes, even if stable routing paths from source nodes to destination nodes do not exist. In some DTN network environments,...

  • Article
  • Open Access
1 Citations
2,753 Views
18 Pages

23 February 2021

The paper studies the framework for the application of computational intelligence methods used for estimations in the distribution power system when a decreased number of measured data is present. Due to the lack of all measured data, the estimation...

  • Article
  • Open Access
1 Citations
2,226 Views
14 Pages

Provision of Data to Use in Artificial Intelligence Algorithms for Single Room Heating

  • Kristin Majetta,
  • Christoph Clauß and
  • Christoph Nytsch-Geusen

23 February 2021

This paper describes a way to generate a great amount of data and to use it to find a relation between a room controller and a certain room. Therefore, simulation scenarios are defined and developed that contain different room, location, usage and co...

  • Article
  • Open Access
8 Citations
3,666 Views
14 Pages

Improving Performance Estimation for Design Space Exploration for Convolutional Neural Network Accelerators

  • Martin Ferianc,
  • Hongxiang Fan,
  • Divyansh Manocha,
  • Hongyu Zhou,
  • Shuanglong Liu,
  • Xinyu Niu and
  • Wayne Luk

23 February 2021

Contemporary advances in neural networks (NNs) have demonstrated their potential in different applications such as in image classification, object detection or natural language processing. In particular, reconfigurable accelerators have been widely u...

  • Article
  • Open Access
7 Citations
2,667 Views
24 Pages

22 February 2021

In this article, we present an analysis of the accuracy level of methods for modeling the multi-service overflow systems that service Erlang, Engset, and Pascal traffic. In systems with traffic overflow, new calls that cannot be serviced by the prima...

  • Article
  • Open Access
14 Citations
3,988 Views
16 Pages

22 February 2021

In this paper, we study the transmit power minimization problem with optimal energy beamforming in a multi-antenna wireless powered communication network (WPCN). The considered network consists of one hybrid access point (H-AP) with multiple antennae...

  • Feature Paper
  • Article
  • Open Access
32 Citations
5,159 Views
18 Pages

Neural Network Based Robust Lateral Control for an Autonomous Vehicle

  • Subrat Kumar Swain,
  • Jagat J. Rath and
  • Kalyana C. Veluvolu

22 February 2021

The lateral motion of an Automated Vehicle (AV) is highly affected by the model’s uncertainties and unknown external disturbances during its navigation in adverse environmental conditions. Among the variety of controllers, the sliding mode controller...

of 16

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292