نتایج جستجو برای: fingerprinting
تعداد نتایج: 9139 فیلتر نتایج به سال:
This work presents a new indoor localization method based on the fingerprinting technique. The proposed method uses a ray-tracing model that provides information about multipath effects. This information is stored in a dataset during the first stage of the fingerprinting method. The direction of arrival (DOA) and received signal strength (RSS) are used in the fingerprinting technique as a hybri...
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting deters their practical implementation, since th...
Fingerprinting is a technique extensively used by law enforcement to identify criminals when traces are left behind which uniquely match a suspect. Digital fingerprinting is a conceptually similar technique. It canbe used to trace intellectual property infringement on virtual components already on the market. The method consists of translating virtual components into a compact sequence of symbo...
Significant progress in many classes of materials could be made with the availability experimentally-derived large datasets composed atomic identities and three-dimensional coordinates. Methods for visualizing local structure, such as atom probe tomography (APT), which routinely generate comprised millions atoms, are an important step realizing this goal. However, state-of-the-art APT instrumen...
In this paper, we discuss graph-theoretic approaches to software watermarking and fingerprinting. Software watermarking is used to discourage intellectual property theft and software fingerprinting is used to trace intellectual property copyright violations. We focus on two algorithms that encode information in software through the use of graph structures. We then consider the different attack ...
Among digital data, documents are the easiest to copy and remove any signatures or fingerprints embedded, which make the pirating the hardest to detect. Anyone can just retype a document or copy a part of it. Document fingerprinting is concerned with accurately identifying and copying, including small partial copies, within large sets of documents. We will make a literature study of Winnowing, ...
this contribution determines suitable fingerprinting properties for sediment source discrimination within theamrovan and atary catchments in semnan province, iran. these catchments are representative of a range of geology formations and should therefore provide a meaningful basis for a general assessment of the degree of sediment source discrimination afforded by a range of fingerprint properti...
Nowadays, plants have been considered as powerful agents for treatment of disorders regarding to their traditional use. In Iranian Traditional Medicine (ITM), plants have a special role in the treatment of various diseases. Burns with their devastating outcomes have been discussed in ITM as well. In the present study, a polyherbal ointment (PHO), retrieved from ITM, was formulated for burn heal...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید