نتایج جستجو برای: درگاه usb
تعداد نتایج: 5036 فیلتر نتایج به سال:
MRI pulse sequence consoles typically employ closed proprietary hardware, software, and interfaces, making difficult any adaptation for innovative experimental technology. Yet MRI systems research is trending to higher channel count receivers, transmitters, gradient/shims, and unique interfaces for interventional applications. Customized console designs are now feasible for researchers with mod...
Till today, there are more than 1 billion smartphone users worldwide. With smartphones become more popular, more security instances have been reported. Therefore, it is important to study the security issues of smartphones and develop effective approaches to safeguard them. This research is focused on Android based systems, in particular, the security of Android Debug Bridge (ADB). As an import...
During the design of device that is based on a central microcontroller for measurements and an additional computer graphical presentation storage measurement results, it often happens there are not enough available USB ports. Therefore need using particular serial converters arises. This paper presents results reliability testing UART-USB communication UM232R converter. The development environm...
Determining a computer’s identity is a challenge of critical importance to users wishing to ensure that they are interacting with the correct system; it is also extremely valuable to forensics investigators. However, even hosts that contain trusted computing hardware to establish identity can be defeated by relay and impersonation attacks. In this paper, we consider how to leverage the virtuall...
Web browsers do not yet provide Web programs with the same safe, convenient access to local devices that operating systems provide to native programs. As a result, Web programmers must either wait for the slowly evolving HTML standard to add support for the device classes they want to use, or they must use difficult to deploy browser plug-ins to add the access they need. This paper describes Ma...
A recent major development in computer technology is the advent of the wearable computer system, which is based on human-centric interface technology trends and ubiquitous computing environments [1, 2]. Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) techni...
The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various ty...
In this paper we address the planning problem of a robot searching for multiple residents in a retirement home in order to remind them of an upcoming multi-person recreational activity before a given deadline. We introduce a novel Multi-User Schedule Based (M-USB) Search approach which generates a high-level plan to maximize the number of residents that are found within the given time frame. Fr...
در این مقاله یک ترکیب کننده دوتایی توان برای فرستنده های پخش تلویزیون دیجیتال در باند فرکانسی uhf عرضه شده است که جزء پایه ای آن یک تزویج کننده استریپ لاین از نوع تزویج از پهناست. سطح تلفات بازگشتی در تمامی درگاه های این ترکیب کننده در کل باند فرکانسی پخش تلویزیون دیجیتال (یعنی 470 تا 862 مگاهرتز) بالاتر از 28 db است. سطح ایزولاسیون بین هر جفت از درگاه های ایزوله در این باند فرکانسی بالاتر از 2...
Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices
Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on individual and corporate systems. The BadUSB is an attack where USB device’s firmware spoofed and, once mounted, allows attackers to execute set of malicious actions in target system. countermeasures against this type can be grouped into two strategies: phyiscal blocking ports software blocking. This paper p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید