نتایج جستجو برای: fingerprinting techniques
تعداد نتایج: 636550 فیلتر نتایج به سال:
Among techniques designated for indoor localization, wireless fingerprinting is the most emerging because of the widespread deployment of wireless networks. Moreover, positioning methods based on received signal strength indicator fingerprint are attractive for their accuracy and independence from the radio propagation model. This paper describes an implementation of Bluetooth Low Energy positi...
This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It disc...
Difficulties in cultivating most of the microorganisms limit our ability to study microbial ecosystems. Molecular methods are valuable tools for investigating the diversity and structure of bacterial communities. These techniques can be used on culturable as well as non-culturable bacteria. Cultivation independent techniques based on nucleic acids extracted from the environment provide informat...
This paper gives the overview of audio and video watermarking. This paper introduces the basic requirements that affect the algorithms for audio and video watermarking which are perceptibility, robustness and security. The attacks which cause manipulations of the audio and video signals are also discussed. The common group of attacks on audio and video data is dynamics, filtering, conversion, c...
A total of 32 yeast strains belonging to four non-Saccharomyces species associated with winemaking was characterized by different molecular techniques. The PCR amplification of 18S rRNA-coding DNA and nontranscribed spacer, followed by restriction analysis with the endonucleases HaeIII and MspI, and PCR fingerprinting with microsatellite primers (GAC)(5) and (GTG)(5) were used. The methods used...
Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered vulnerability. This paper discusses techniques for remote identification of web servers and suggests possible defenses to the probing activity. General concepts of fingerprinting and their application to the identificat...
Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...
DNA is a unique piece of genetic material within biological organisms. Nowadays, molecular techniques can be used to generate DNA fingerprinting in many species of animals. It is used in a variety of applications in veterinary medicine such as parentage testing, wildlife investigation and individual and sex identification. The samples can be collected from any biological samples such as blood, ...
Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید