نتایج جستجو برای: signature sequence
تعداد نتایج: 468007 فیلتر نتایج به سال:
We consider packet DS-CDMA systems with a connectionless architecture where no dedicated connection is kept between users and the system. Users have to access the system using the same signature sequence and have to be acquired each time they need to send packets. Due to the asynchronous nature of the system, multiple users can be accommodated even when a single signature is available. However,...
The fundamental difference between the data-hiding and watermark signature verification problems was highlighted in a 2001 paper by Steinberg and Merhav. In data hiding, the maximum number of messages that can be reliably decoded is essentially 2 , where n is the host sequence length and C is the data-hiding capacity. A dramatically different result is obtained for signature verification: in pr...
The single channel Circular Synthetic Aperture Radar (CSAR) has the advantage of continuous surveillance a fixed scene interest, which can provide high frame rate image sequences to detect ground moving targets. Recent image-sequence-based CSAR target detection methods utilize fact that signal moves fast in sequence. Knowledge target’s trace(moving trace sequence, is equal signature’s morpholog...
A linear decentralized receiver capable of suppressing multiple-access interference (MAI) for asynchronous directsequence code-division multiple-access (DS-CDMA) systems with aperiodic random signature sequences is proposed. Performance bounds on this receiver are also obtained. Using them as performance measures, the problem of chip waveform selection in DS-CDMA systems with the proposed recei...
How thermally activated structural excitations quantitatively mediate transport and microplasticity in a model binary glass at the microsecond timescale is revealed using atomistic simulation. These local excitations, involving stringlike sequence of atomic displacements, admit far-field shear-stress signature underlie free-volume bond geometry. Such found to correspond evolution disclination n...
Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in the post-quantum world. Due to its high efficiency and modest computational requirements, multivariate cryptography seems especially appropriate for signature schemes on low cost devices. However, multivariate schemes are not much used yet, mainly because of the large size of their p...
Scanning files for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware family. However, it is not clear how to automatically generate these string signatur...
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of attacks, we impose the condition that the quality of the recovered signature image should be better if the attack is milder. We present a simple hybrid analogdigital hiding technique for this purpose. The signature image ...
in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید