نتایج جستجو برای: bar code

تعداد نتایج: 196633  

2016
Gábor Pék Zsombor Lázár Zoltán Várnagy Márk Félegyházi Levente Buttyán

In this paper, we design and implement Membrane, a memory forensics tool to detect code loading behavior by stealthy malware. Instead of trying to detect the code loading itself, we focus on the changes it causes on the memory paging of the Windows operating system. As our method focuses on the anomalies caused by code loading, we are able to detect a wide range of code loading techniques. Our ...

Journal: :AJR. American journal of roentgenology 1996
G Weltin H Swett

OBJECTIVE Many radiology information systems (RISs) installed during the 1980s have a user interface that is crude by today's standards. We explored improving this user interface by using the local processing power of the personal computer. In this article we describe a computer program that significantly enhances the ease of report retrieval by automating much of the interaction with our RIS, ...

Journal: :Science 2004
Erik Stokstad

Let the bar-coding begin.The Alfred P. Sloan Foundation has given a $669,000 grant to a consortium of herbaria, museums, and research institutes to jump-start the Barcode Life Initiative, which aims to create an online catalog of the world’s flora and fauna. Each “bar code” will be a short DNA sequence taken from a mitochondrial gene. The sequences define individual species and will help resear...

Journal: :Inf. Manag. Comput. Security 2002
Alan D. Smith O. Felix Offodile

Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under-recognized IT strategic assets in use in the global economy. Data collection and integration strategies are essentia l to enterprise resource management systems as well as warehouse management systems. The development of innovation through the development and marketing of products and s...

2013
Marcelo de Araújo Manoel de Souza Soares

The bar code is one of the identification technologies used more successfully in the world. This technology was first developed as the second half of the twentieth century and quickly achieved acceptance in both industry and commerce. In this paper studies are discussed on the design, development and printing of one-dimensional barcodes of the symbologies Code 39 and Interleaved 2 of 5. There a...

2011
Sona Kaushik

With the vast introduction of the wireless world, the exchanged information now is more prone to security attacks than ever. Barcodes are the information careers in the form of an image. Their various applications have been discussed in brief and also the structure, symbology and properties of barcodes. This paper aims to provide an approach which can share high security information over the ne...

2008
G. M. Zhang R. C. Batra J. Zheng

We analyze, with the computer code LS-DYNA, three-dimensional (3D) transient deformations of a 10-layer woven Kevlar armor held in a square steel frame and impacted at normal incidence by a 9 mm FMJ (full metal jacket), 124 grain projectile. The composite armor is discretized into weft and warp yarns to simulate its woven structure. The yarn is modeled as a 3D continuum. We consider failure of ...

Journal: :CoRR 2015
Shounak Roy Shayan Garani Srinivasa

We construct two-dimensional codes for correcting burst errors using the finite field Fourier transform. The encoding procedure is performed in the transformed domain using the conjugacy property of the finite field Fourier transform. The decoding procedure is also done in the transformed domain. Our code is capable of correcting multiple non-overlapping occurrence of different error patterns f...

2012
Jozef Slowik Gergin A. Blagoev

Surveys during the summer of 2004 and August 2009 on Prince of Wales Island, Alaska, USA resulted in collection of 1064 adult spiders representing 84 species. Barcoding of spiders collected in 2009 resulted in DNA barcode data for 212 specimens representing 63 species. DNA barcode data were then used to facilitate the identification of otherwise unidentifiable juvenile and female specimens as w...

2017
Jagruti R. Mahajan Nitin N. Patil Chung-Hsin Liu Chia-Hong Chou H. C. Huang F. C. Chang

In digital watermarking, images which have specific pattern images. They used as digital watermarks for variety purposes in copy prevention emerging solution. Conversely, several attacks still get unsolved in a robustness of invisible watermarking techniques. An effective technique for visible watermarking can be retrieved to identify the ownership of the protected media. The purpose to show th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید