نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
This paper presents the design, experiment test and performance evaluation of FAST, a fast tag identification protocol in RFID systems. FAST includes a collision tolerant mechanism (CTM) that can identify tags in collision slots correctly. Each tag sends a randomly selected signature in its selected slot. When multiple tags select the same slot and a collision occurs, the reader can detect all ...
This paper considers the problem of engine-to-slip dynamics modeling in a sport motorbike. Instead of using the classical approach of multibody modeling, this work takes the challenge of directly estimating the input/output slip dynamics by black-box identification, using data collected with experiments specifically designed for this purpose. The proposed identification protocol allows to deriv...
Radio Frequency IDentification (RFID) systems are becoming more and more popular in the field of ubiquitous computing, in particular for objects identification. An RFID system is composed by one or more readers and a number of tags. One of the main issues in an RFID network is the fast and reliable identification of all tags in the reader range. The reader issues some queries, and tags properly...
In large-scale RFID systems, all of the communications between readers and tags are via a shared wireless channel. When a reader intends to collect all IDs from numerous existing tags, a tag identification process is invoked by the reader to collect the tags’ IDs. This phenomenon results in tag-to-reader signal collisions which may suppress the system performance greatly. To solve this problem,...
In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but ...
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks. key words: cryptanalysis, user identification, ID-based cryptosystem, wi...
API ZYM and API An-Ident enzymatic substrate tests were done on six oral species which are difficult to characterize with conventional biochemical tests. "Bacteroides forsythus, the "fusiform" Bacteroides species (A. C. R. Tanner, M. A. Listgarten, M. N. Strzempko, and J. L. Ebersole, manuscript in preparation), is difficult to cultivate in broth media, yet it gave 15 positive tests in these se...
T h e covariance ma t r i x of a rotationally s y m m t r i c shape i s a scalar ident i ty ma t r i x . In this paper, w e apply this property of covariance m a t r i x t o deskew the skewed shape of rotational s y m m e t r y . T h e parameters of the deskew t rans format ion m a t r i x are solved by lett ing the covariance ma t r i x of t he t rans formed shape be equal t o a scalar ident i...
Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss or theft, of biometric data. Biometric matching is often performed by two mutually suspicious parties, one of which holds one biometric image while the other owns a possibly large biometric collection. Due to privacy and liability cons...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید