نتایج جستجو برای: fingerprinting techniques

تعداد نتایج: 636550  

Journal: :Data 2022

Indoor positioning has garnered significant interest over the last decade due to rapidly growing demand for location-based services. As a result, multitude of techniques been proposed localize objects and devices in indoor environments. Wireless fingerprinting, which leverages machine learning, emerged as one most popular approaches its low implementation cost. The prevailing fingerprinting-bas...

Journal: :The Science of the total environment 2005
D E Walling

Recent years have seen a growing awareness of the wider environmental significance of the suspended sediment loads transported by rivers and streams. This includes the importance of fine sediment in the transport of nutrients and contaminants, including phosphorus (P). Sediment source exerts a key control on the physical and geochemical properties of suspended sediment, including its P content,...

1999
John Lach William H. Mangione-Smith Miodrag Potkonjak

The use of digital marks to provide ownership (watermarking) and recipient (fingerprinting) identification for intellectual property (IP) has become widespread. However, many of these techniques require a high complexity of copy detection, are vulnerable to mark removal after revelation for ownership verification, and are susceptible to reduced mark integrity due to partial mark removal. This p...

Journal: :Environmental biosafety research 2008
Lorenzo Brusetti Sara Borin Aurora Rizzi Diego Mora Claudia Sorlini Daniele Daffonchio

Different techniques to assess bacterial community structure and diversity were evaluated in silages prepared with four different maize cultivars, three conventional and one transgenic (cv. Tundra, event Bt-176). Plants were cultivated in the greenhouse and harvested after 30 days of growth. Silage samples were collected at successive times during fermentation and analyzed for bacterial counts ...

Recognition of origin of sand dunes is very important in wind erosion control projects. Because of many problems associated with traditional procedures for identifying sediment sources, fingerprinting techniques, based on physical, chemical and organic properties of sediment and source materials, are increasingly being used as a valuable and effective alternative approach to assembling such inf...

2016
Anupam Das Nikita Borisov Matthew Caesar

Modern smartphones contain motion sensors, such as accelerometers and gyroscopes. These sensors have many useful applications; however, they can also be used to uniquely identify a phone by measuring anomalies in the signals, which are a result of manufacturing imperfections. Such measurements can be conducted surreptitiously by web page publishers or advertisers and can thus be used to track u...

2007
Hyun-Ho Kang Brian M. Kurkoski Kazuhiko Yamaguchi Kingo Kobayashi

In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper we generalize our previous work, further the collusion robustness is supplemented by additional security and practical experiment. This includes a more efficient tree decision method, generalization of the fingerprin...

2017
Daniele Borio Ciro Gioia Eduardo Cano Pons Gianmarco Baldini

Falsifying Global Navigation Satellite System (GNSS) data with a simulator or with a fake receiver can have a significant economic or safety impact in many transportation applications where Position, Velocity and Time (PVT) are used to enforce a regulation. In this context, the authentication of the source of the PVT data (i.e., the GNSS receiver) is a requirement since data faking can become a...

2018
Juan Luo Xixi Yin Yanliu Zheng Chun Wang

[-5]Indoor localization based on WiFi has attracted a lot of research effort because of the widespread application of WiFi. Fingerprinting techniques have received much attention due to their simplicity and compatibility with existing hardware. However, existing fingerprinting localization algorithms may not resist abnormal received signal strength indication (RSSI), such as unexpected environm...

2012
Feng Chen Qiben Yan Chowdhury Shahriar Chang-Tien Lu Wenjing Lou Charles Clancy

This paper presents a new concept of device fingerprinting (or profiling) to enhance wireless security using Infinite Hidden Markov Random Field (iHMRF). Wireless device fingerprinting is an emerging approach for detecting spoofing attacks in wireless network. Existing methods utilize either time-independent features or time-dependent features, but not both concurrently due to the complexity of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید