![](images/graphics/blank.gif)
Network fingerprint
-
This research investigates other built-in sensors and develops methods for improving the accuracy of indoor positioning. Combination with the wireless network, it can be a viable alternative solution for the indoor positioning purposes of the smartphone users. The main advantage of this solution is that it can be deployed with a minimal cost, as no specialized hardware is necessary for setting up the system.
91p
runthenight05
01-03-2023
5
2
Download
-
Bài viết trình bày đề xuất mô hình hệ thống định vị trong nhà dựa trên công nghệ Bluetooth Low Energy (BLE) và mạng Nơ-ron nhân tạo, triển khai hoạt động trên thiết bị BLE iBeacon, cùng với mạch Raspberry Pi 3. Hệ thống sẽ sử dụng phương pháp Fingerprinting để xây dựng một cơ sở dữ liệu từ cường độ tín hiệu đo được từ các iBeacon, và xử lý qua một mạng Nơ-ron nhân tạo để dự đoán vị trí của Raspberry Pi 3.
6p
vistephenhawking
26-04-2022
17
3
Download
-
Lecture Advanced network security: Remote services security introduces contents such as File transfer protocol (FTP), fingerprinting an exposed telnet service, two remotely exploitable IPMI flaws, known exploitable vulnerabilities within VNC server software, RPC service vulnerabilities.
46p
lavender2022
22-04-2022
31
3
Download
-
Many biological pathways have been created to represent different types of knowledge, such as genetic interactions, metabolic reactions, and gene-regulating and physical-binding relationships. Biologists are using a wide range of omics data to elaborately construct various context-specific differential molecular networks.
9p
viflorida2711
30-10-2020
17
2
Download
-
In the Wireless Local Area Network (WLAN), due to the unexpected operation of equipments and the changing of surround environment, the dropping and multi-component problems might present in the observed data. Dropping refers to the fact that occasionally Received Signal Strength Indication (RSSI) measurements of Wi-Fi access points (AP) are not available, although their value is clearly above the limited sensitivity of Wi-Fi sensors on portable devices.
10p
visumika2711
17-07-2019
36
1
Download
-
Algorithm based on facts and existing data show that the recognition of an identification or verification system performance can be improved by using more than one biometric "Multimodal Biometric".
5p
byphasse043256
24-03-2019
12
2
Download
-
In this paper, a simple technique is proposed for fingerprint analysis using minutiae extraction process with the combination of several techniques for image pre-processing to improve the input image until it is suitable for minutiae extraction. In addition, two major categories of minutiae and bifurcation are used here.
9p
byphasse043256
24-03-2019
12
1
Download
-
This research is focused on the calculation of the efficiency of the storage medium and the optimum point combination fingerprint length, degree of similarity and storage media.
8p
byphasse043256
23-03-2019
13
1
Download
-
In the algorithm, first construct a dictionary for predefined fingerprint image patches. For a new given fingerprint images, represent its patches according to the dictionary by computing l0- minimization and then quantize and encode the coefficients and other related information using lossless coding methods. A fast Fourier filtering transformation for image post processing helped to improve the contrast ratio of the regenerated image Here, considered the effect of various factors on compression results. In Automatic Fingerprint identification.
8p
byphasse043256
23-03-2019
26
2
Download
-
In this paper, the authors present a hybrid multibiometric authentication person system that integrates both multi modal and multi algorithmic. Multi-modal, the system using face and fingerprint features, has long been considered common in personal authentication. Multi-algorithm is the system which uses Circularly Orthogonal Moments, such as Zernike Moment (ZM), Pseudo Zernike Moment (PZM), Polar Cosine Transform (PCT) and Radial Basis Function (RBF) Neural Networks. These moments are widely used because their magnitudes are invariant to image rotation, scaling and noise.
6p
girlsseek
27-02-2019
26
2
Download
-
In this paper, the authors present a multimodal biometric system using face and fingerprint features with the incorporation of Zernike Moment (ZM) and Radial Basis Function (RBF) Neural Network for personal authentication.
12p
girlsseek
27-02-2019
33
0
Download
-
Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing
55p
muathu_102
28-01-2013
63
2
Download
-
Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing Evading detection Bouncing
76p
muathu_102
28-01-2013
55
3
Download
-
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.
1401p
muathu_102
28-01-2013
97
22
Download
-
Tham khảo bài thuyết trình 'module 19 - penetration testing', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
74p
hoangtumayman
20-08-2012
94
21
Download
-
Tham khảo bài thuyết trình 'module 18 - cryptography', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
49p
hoangtumayman
20-08-2012
80
18
Download
-
Tham khảo bài thuyết trình 'module 17 - buffer overflow', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
58p
hoangtumayman
20-08-2012
83
21
Download
-
Tham khảo bài thuyết trình 'module 16 - evading ids, firewalls, and honeypots', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
96p
hoangtumayman
20-08-2012
91
28
Download
-
Tham khảo bài thuyết trình 'module 15 - hacking wireless networks', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
148p
hoangtumayman
20-08-2012
149
61
Download
-
Tham khảo bài thuyết trình 'module 14 - sql injection', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
95p
hoangtumayman
20-08-2012
112
36
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)