نتایج جستجو برای: fingerprinting techniques

تعداد نتایج: 636550  

2017
Annalisa Longo Maria Rizzi Davide Amendolare Sante Stanisci Ruggero Russo Gianpaolo Cice Matteo D'Aloia

Among techniques designated for indoor localization, wireless fingerprinting is the most emerging because of the widespread deployment of wireless networks. Moreover, positioning methods based on received signal strength indicator fingerprint are attractive for their accuracy and independence from the radio propagation model. This paper describes an implementation of Bluetooth Low Energy positi...

Journal: :J. UCS 2005
Ravi Sankar Veerubhotla Ashutosh Saxena Ved Prakash Gulati Arun K. Pujari

This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It disc...

2012
Md. Fakruddin Khanjada Shahnewaj Bin Mannan

Difficulties in cultivating most of the microorganisms limit our ability to study microbial ecosystems. Molecular methods are valuable tools for investigating the diversity and structure of bacterial communities. These techniques can be used on culturable as well as non-culturable bacteria. Cultivation independent techniques based on nucleic acids extracted from the environment provide informat...

2013
HARLEEN KAUR

This paper gives the overview of audio and video watermarking. This paper introduces the basic requirements that affect the algorithms for audio and video watermarking which are perceptibility, robustness and security. The attacks which cause manipulations of the audio and video signals are also discussed. The common group of attacks on audio and video data is dynamics, filtering, conversion, c...

Journal: :International journal of food microbiology 2003
A Capece G Salzano P Romano

A total of 32 yeast strains belonging to four non-Saccharomyces species associated with winemaking was characterized by different molecular techniques. The PCR amplification of 18S rRNA-coding DNA and nontranscribed spacer, followed by restriction analysis with the endonucleases HaeIII and MspI, and PCR fingerprinting with microsatellite primers (GAC)(5) and (GTG)(5) were used. The methods used...

2002
Dustin Lee Jeff Rowe Calvin Ko Karl N. Levitt

Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered vulnerability. This paper discusses techniques for remote identification of web servers and suggests possible defenses to the probing activity. General concepts of fingerprinting and their application to the identificat...

2009
Ehsan Amiri Gábor Tardos

Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...

2011
Janjira Phavaphutanon

DNA is a unique piece of genetic material within biological organisms. Nowadays, molecular techniques can be used to generate DNA fingerprinting in many species of animals. It is used in a variety of applications in veterinary medicine such as parentage testing, wildlife investigation and individual and sex identification. The samples can be collected from any biological samples such as blood, ...

2003
Antoni Martínez-Ballesté Francesc Sebé Josep Domingo-Ferrer Miguel Soriano

Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...

Journal: :Physica B: Condensed Matter 2004

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید