نتایج جستجو برای: fingerprinting techniques
تعداد نتایج: 636550 فیلتر نتایج به سال:
Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images
The continuously widening design productivity gap in the past few decades gives high incentives to counterfeiting ICs. Existing intellectual property (IP) protection schemes demand high overheads, and some techniques like watermarking do not facilitate tracing of illegal users. In this letter,we propose a novel fingerprinting method based on post-processing on circuit partitions. We evaluate ou...
1. The Importance of Biodiversity Research in the Marine Environment 2. What Questions can be Answered Using Molecular Biology Techniques? 3. Evaluating Marine Biodiversity by Sequence Analysis and Fingerprinting Methods 3.1. Sequence Analysis 3.1.1. Which Genes to Select? 3.1.2. How to Generate Sequence Data? 3.1.3. Determining Biodiversity in an Environmental Sample by Sequence Analysis 3.1.4...
This deliverable presents a literature survey of localisation in communication networks. In a first part, use of communication networks for location estimation is presented. Two families of methods do exist: fingerprinting and geometrical techniques. Cooperative positioning is one possible enhancement. In a second part, use of location information to improve radio resource management, specifica...
AbsfracfAn audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they allow the monitoring of audio independently of its format and without the need of meta-data or watermark embedding. The different approaches to fingerprinting are usually described with different rationales and termi...
Crude oil spilled from the Herbaysprit in Oecember 2007 and contaminated Tae Ann Sound shoreline. A weathered oiled sediment collected at the spill area (Tai Ann beach) from 3 months to 12 months after the spil l. The fingerprinting and data interpretation techniques oil spill characterization and identification studies and environmental investigations discussed indude oil spill identification ...
UNLABELLED High-throughput content fingerprinting techniques employing capillary electrophoresis place new demands on the editing of fingerprint files for the downstream contig assembly program, FPC. A cross-platform software application, GenoProfiler, was developed for automated editing of sized fingerprinting profiles generated by the ABI Genetic Analyzers. The batch-processing module extract...
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide ...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a remote computer’s network stack. The combination of such information can be then used to infer the remote operating system (OS fingerprinting). OS fingerprinting is traditionally based on a database of “signatures”. A signature comprises several features (i.e., pairs attribute/value) extracted from...
A robust hash, or content-based fingerprint, is a succinct representation of the perceptually most relevant parts of a multimedia object. A key requirement of fingerprinting is that elements with perceptually similar content should map to the same fingerprint, even if their bit-level representations are different. In this work we focus on the construction of discriminative binary local descript...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید