نتایج جستجو برای: composite fingerprinting

تعداد نتایج: 130702  

Journal: :ecopersia 2012
asghar kouhpeima sadat feiznia

today fingerprinting techniques are increasingly adopted as an alternative and more direct and reliable means of assembling sediment source information. one of the principal assumptions of sediment fingerprinting is that potential catchment sediment sources can be distinguished on the basis of their physical, geochemical and biological properties or fingerprint properties. however, while the so...

Journal: Desert 2012
A. Kouhpeima H. Ahmadi H. Ghadimi S. Feiznia S.A. Asghar Hashemi

This contribution determines suitable fingerprinting properties for sediment source discrimination within theAmrovan and Atary catchments in Semnan Province, Iran. These catchments are representative of a range of geology formations and should therefore provide a meaningful basis for a general assessment of the degree of sediment source discrimination afforded by a range of fingerprint properti...

Journal: :IJBIS 2010
Atta Badii Daniel Thiemert

Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or ”DNA”. Current approaches show insufficient deployment of three types of knowledge that could be brought to bear in providing a finger printing framework that remains effective, efficient and can accommodate both the whole as well as elemental prote...

Extended abstract 1. Introduction Soil erosion is a major environmental threat worldwide. This three-stage process including detachment, transportation and sedimentation of soil particle by runoff affects natural and agricultural areas of Iran. Soil erosion has many off-site and on-site effects such as sediment deposition in the lake of dam and channels, transportation of nutrients and contam...

Journal: :CoRR 2014
Farzad Farhadzadeh Frans M. J. Willems Sviatoslav Voloshynovskiy

Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called active content fingerprinting was introduced to overcome these shortcomings. Active content fingerprinting aims to m...

A. Hamedi A. Sakhteman F. Ahmadi M. Sohrabpour M.M. Zarshenas

Background and objectives: Traditional polyherbal oils are still in use in Persian Traditional Medicine (PTM). Most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. Thus, their quality control, standardization and authentication are real challenges ...

Avesta Sadrzadeh Mahdi Askari Badouei Seyed Mostafa Peighambari, سید مصطفی پیغمبری,

BACKGROUND: Colibacillosis is one of the most economically important diseases of poultry worldwide. OBJECTIVES: This study was conducted to examine the clonal relatedness and typing of 95 avian Escherichia coli isolates by ERIC-PCR. METHODS: Sixty-three E. coli isolates from two common manifestations of colibacillosis (yolk sac infection and colisepticemia) and 32 isolates from feces of apparen...

Journal: :Physical review letters 2005
Rolf T Horn S A Babichev Karl-Peter Marzlin A I Lvovsky Barry C Sanders

We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart. For one-qubit fingerprinting of two-bit messages, we prepare "tetrahedral" qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability. We prove that shared entanglement permits 100% reliab...

Journal: :IEICE Transactions 2009
Hideki Yagi Toshiyasu Matsushima Shigeichi Hirasawa

Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread s...

2013
HUIFEN HUANG DEFA HU

Under the application occasion of using data base as the soft products publication, there should be corresponding safety system, which could abstain the privacy actions from the betray users. A privacy tracing and solution resolution is raised in this thesis based on the digital fingerprinting relationship data base. Data fingerprinting database, which combined by patent watermarking and user’s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید