搜索结果: 1-15 共查到“fingerprint”相关记录20条 . 查询时间(0.093 秒)
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
Localization privacy security
2018/3/12
Localization based on premeasured WiFi fingerprints is a popular method for indoor localization where satellite based positioning systems are unavailable. In these systems, privacy of the users' locat...
World’s smallest neutrino detector finds big physics fingerprint(图)
World’s smallest neutrino detector big physics fingerprint
2017/9/4
After more than a year of operation at the Department of Energy’s (DOE’s) Oak Ridge National Laboratory (ORNL), the COHERENT experiment, using the world’s smallest neutrino detector, has found a big f...
SO YOU THINK YOU CAN SECURE YOUR MOBILE PHONE WITH A FINGERPRINT?
SECURE YOUR MOBILE PHONE FINGERPRINT
2017/4/27
No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of Engineering have found that ...
AN INDOOR SPACE PARTITION METHOD AND ITS FINGERPRINT POSITIONING OPTIMIZATION CONSIDERING PEDESTRIAN ACCESSIBILITY
In-door Navigation Space Partition Fingerprint Position Algorithm Pedestrian Accessibility
2016/11/8
Fingerprint positioning method is generally the first choice in indoor navigation system due to its high accuracy and low cost. The accuracy depends on partition density to the indoor space. The accur...
Purdue innovation provides 'fingerprint' to identify foodborne pathogens,moves closer to production
Purdue fingerprint foodborne pathogens moves closer to production
2016/2/22
A Purdue University innovation that creates a "fingerprint-like pattern" to identify foodborne pathogens without using reagents has been licensed by Hettich Lab Technology. The technology is...
Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
private fingerprint authentication oblivious algorithm maximum flow
2016/1/8
The increasing availability and use of biometric data for authentication and other purposes
leads to situations when sensitive biometric data is to be handled or used in computation by
entities who ...
Post hoc Indoor Localization Based on RSS Fingerprint in WLAN
post hoc localization indoor wifi fingerprint
2014/12/8
In the investigation of crimes committed by wireless users, one of the key goals is to determine the location of the mobile device at the time of the crime. Since this happens during the investigative...
A possible way to identify the fingerprint of the universe
large scale structure of the universe map of the universe topology of the universe redshift space distribution of galaxies galaxies evolution
2011/9/26
There is a phenomenon that the inverse image of a given celestial object could in principle be seen in negative directions in a closed universe which there is no horizon problem, but it is difficult t...
Study on the Use of Rhodamine Doped Nanocomposite for Latent Fingerprint Detection
Detection Fingerprint Nanocomposite Rhodamine B
2011/12/20
Silicon dioxide-based nanocomposites offer large loading capacity for various doping chemicals or molecular complexes, high surface to volume ratio and customizable surface chemistry for the creation ...
Short collusion-secure fingerprint codes against three pirates
fingerprinting information hiding
2010/12/22
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pirate tracing algorithm ...
Secure and Efficient Protocols for Iris and Fingerprint Identification
secure biometric computation two-party protocols implementation
2010/12/14
With recent advances in biometric recognition and the increasing use of biometric data in various applications, it is apparent that sensitive biometric data needs to be adequately protected. Biometric...
Genetic Fingerprint Concerned with Lymphatic Metastasis of Human Lung Squamous Cancer
Lung neoplasms Gene-expression Lymphatic metastasis
2013/12/10
Background and objective With the most recent introduction of microarray technology to biology, it becomes possible to perform comprehensive analysis of gene expression in cancer cell. In this study t...
Region-Based Watermarking of Biometric Images: Case Study in Fingerprint Images
Region-Based Watermarking Biometric Images Fingerprint Images
2009/9/2
In this paper, a novel scheme to watermark biometric images is proposed. It exploits the fact that biometric images, normally, have one region of interest, which represents the relevant part of inform...
基于紫外指纹图谱技术的食醋品种检测方法(Method of Vinegar Detection Based on Ultraviolet Fingerprint Technology)
食醋 检测 紫外光谱
2009/5/22
以不同食醋为研究对象,采用旋转蒸发、紫外光谱扫描等手段研究了波长范围、蒸发液稀释比例、蒸发温度和参比液质量浓度等对食醋紫外吸收曲线的影响,确定了食醋紫外指纹图谱检测方法的试验条件:扫描波长范围245~330nm,蒸发液稀释比例1∶6,蒸发温度45℃,冰醋酸参比液质量浓度45g/L。以曲线间的相似度为指标验证了方法的重现性、稳定性和差异性,结果表明:各个食醋样品3次重复测定的指纹图谱间相似度均大于0...
This paper presents such a solution. The proposed protocol is based
on the following idea: the card stores the user's fingerprint information
to which random minutiae were added at enrolment time (w...