intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network fingerprint

Xem 1-20 trên 34 kết quả Network fingerprint
  • This research investigates other built-in sensors and develops methods for improving the accuracy of indoor positioning. Combination with the wireless network, it can be a viable alternative solution for the indoor positioning purposes of the smartphone users. The main advantage of this solution is that it can be deployed with a minimal cost, as no specialized hardware is necessary for setting up the system.

    pdf91p runthenight05 01-03-2023 5 2   Download

  • Bài viết trình bày đề xuất mô hình hệ thống định vị trong nhà dựa trên công nghệ Bluetooth Low Energy (BLE) và mạng Nơ-ron nhân tạo, triển khai hoạt động trên thiết bị BLE iBeacon, cùng với mạch Raspberry Pi 3. Hệ thống sẽ sử dụng phương pháp Fingerprinting để xây dựng một cơ sở dữ liệu từ cường độ tín hiệu đo được từ các iBeacon, và xử lý qua một mạng Nơ-ron nhân tạo để dự đoán vị trí của Raspberry Pi 3.

    pdf6p vistephenhawking 26-04-2022 17 3   Download

  • Lecture Advanced network security: Remote services security introduces contents such as File transfer protocol (FTP), fingerprinting an exposed telnet service, two remotely exploitable IPMI flaws, known exploitable vulnerabilities within VNC server software, RPC service vulnerabilities.

    pdf46p lavender2022 22-04-2022 31 3   Download

  • Many biological pathways have been created to represent different types of knowledge, such as genetic interactions, metabolic reactions, and gene-regulating and physical-binding relationships. Biologists are using a wide range of omics data to elaborately construct various context-specific differential molecular networks.

    pdf9p viflorida2711 30-10-2020 17 2   Download

  • In the Wireless Local Area Network (WLAN), due to the unexpected operation of equipments and the changing of surround environment, the dropping and multi-component problems might present in the observed data. Dropping refers to the fact that occasionally Received Signal Strength Indication (RSSI) measurements of Wi-Fi access points (AP) are not available, although their value is clearly above the limited sensitivity of Wi-Fi sensors on portable devices.

    pdf10p visumika2711 17-07-2019 36 1   Download

  • Algorithm based on facts and existing data show that the recognition of an identification or verification system performance can be improved by using more than one biometric "Multimodal Biometric".

    pdf5p byphasse043256 24-03-2019 12 2   Download

  • In this paper, a simple technique is proposed for fingerprint analysis using minutiae extraction process with the combination of several techniques for image pre-processing to improve the input image until it is suitable for minutiae extraction. In addition, two major categories of minutiae and bifurcation are used here.

    pdf9p byphasse043256 24-03-2019 12 1   Download

  • This research is focused on the calculation of the efficiency of the storage medium and the optimum point combination fingerprint length, degree of similarity and storage media.

    pdf8p byphasse043256 23-03-2019 13 1   Download

  • In the algorithm, first construct a dictionary for predefined fingerprint image patches. For a new given fingerprint images, represent its patches according to the dictionary by computing l0- minimization and then quantize and encode the coefficients and other related information using lossless coding methods. A fast Fourier filtering transformation for image post processing helped to improve the contrast ratio of the regenerated image Here, considered the effect of various factors on compression results. In Automatic Fingerprint identification.

    pdf8p byphasse043256 23-03-2019 26 2   Download

  • In this paper, the authors present a hybrid multibiometric authentication person system that integrates both multi modal and multi algorithmic. Multi-modal, the system using face and fingerprint features, has long been considered common in personal authentication. Multi-algorithm is the system which uses Circularly Orthogonal Moments, such as Zernike Moment (ZM), Pseudo Zernike Moment (PZM), Polar Cosine Transform (PCT) and Radial Basis Function (RBF) Neural Networks. These moments are widely used because their magnitudes are invariant to image rotation, scaling and noise.

    pdf6p girlsseek 27-02-2019 26 2   Download

  • In this paper, the authors present a multimodal biometric system using face and fingerprint features with the incorporation of Zernike Moment (ZM) and Radial Basis Function (RBF) Neural Network for personal authentication.

    pdf12p girlsseek 27-02-2019 33 0   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing

    ppt55p muathu_102 28-01-2013 63 2   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing Evading detection Bouncing

    ppt76p muathu_102 28-01-2013 55 3   Download

  • Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.

    pdf1401p muathu_102 28-01-2013 97 22   Download

  • Tham khảo bài thuyết trình 'module 19 - penetration testing', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf74p hoangtumayman 20-08-2012 94 21   Download

  • Tham khảo bài thuyết trình 'module 18 - cryptography', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf49p hoangtumayman 20-08-2012 80 18   Download

  • Tham khảo bài thuyết trình 'module 17 - buffer overflow', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf58p hoangtumayman 20-08-2012 83 21   Download

  • Tham khảo bài thuyết trình 'module 16 - evading ids, firewalls, and honeypots', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf96p hoangtumayman 20-08-2012 91 28   Download

  • Tham khảo bài thuyết trình 'module 15 - hacking wireless networks', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf148p hoangtumayman 20-08-2012 149 61   Download

  • Tham khảo bài thuyết trình 'module 14 - sql injection', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf95p hoangtumayman 20-08-2012 112 36   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
4=>1