-
201
Robust image hiding algorithm for secure multimodal biometrics
Published 2016-09-01“…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
Get full text
Article -
202
A digital signature scheme based on shared key in intelligent terminal
Published 2017-02-01“…In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.…”
Get full text
Article -
203
Developing a Health Support System to Promote Care for the Elderly
Published 2025-01-01“…The proposed armband also includes a fingerprint identification system that allows only authorized personnel to use it. …”
Get full text
Article -
204
Quantitative Analysis of the Multicomponent and Spectrum–Effect Correlation of the Antispasmodic Activity of Shaoyao-Gancao Decoction
Published 2022-01-01“…The common peaks of fingerprints were evaluated by the similarity with the chromatographic fingerprints of the TCM. …”
Get full text
Article -
205
Parameters Influencing Sulfur Speciation in Environmental Samples Using Sulfur K-Edge X-Ray Absorption Near-Edge Structure
Published 2012-01-01“…This paper aims to enhance the credibility of applying the sulfur K-edge XANES spectroscopy as an innovative “fingerprint” for characterizing environmental samples. …”
Get full text
Article -
206
Authentication-based double images fractal watermarking model of vector maps
Published 2009-01-01“…To realize the invasion identification and copyright authentication, a novel digital watermarking model for vector maps based on authentication was introduced.A double images fractal coding technology was proposed for the compound images, namely, the map owner’s fingerprint was taken as the domain blocks and the vector map was taken as range blocks.The control parameters of fractal similarity computation were defined as watermarking, which could be embedded into the properties file of the map.Experiments and analysis show that, besides providing services of copyright protection, the model improves the robustness and the owners’ authentication probability.…”
Get full text
Article -
207
Measurement of video initial buffer size for mobile network
Published 2019-10-01“…To resolve the difficulty in accurately measure the length of video initial buffering queue,two video platforms,non-encrypted Youku and encrypted YouTube,were selected to research,and the video initial buffer queue length measurement method was proposed.By identifying and analyzing the characteristics of video traffic,correlating the traffic behavior with the playing state,constructing video fingerprint database,accurate measurement of queue length was realized.The experimental results show that the measurement results of the two types could be accurate to the frame,fully meeting the need to accurately evaluate the quality of the video experience.…”
Get full text
Article -
208
Research on indoor localization algorithm based on kernel principal component analysis
Published 2017-01-01“…An indoor localization algorithm based on kernel principal component analysis (KPCA) was proposed.It applied KPCA to train the original location fingerprint (OLF) and extract the nonlinear feature of the OLF data at the offline stage,such that the information of all AP was more efficiently utilized.At the online stage,an improved weight k-nearest neighbor algorithm for positioning which could automatically choose neighbors was proposed.The experiments were carried out in a realistic WLAN environment.The results show that the algorithm outperforms the existing methods in terms of the mean error and localization accuracy.Moreover,it requires less times of RSS acquisition and AP number.…”
Get full text
Article -
209
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01“…The experimental results show that the new protocol has a small increase in the time overhead, and the fingerprint template is updated in TPM, which effectively increases the recognition rate.…”
Get full text
Article -
210
Research on the IP alias resolution technology
Published 2019-07-01“…IP alias resolution,the procedure of identifying IP addresses belonging to the same router,is a critical step in Internet topology inference.It can convert the Internet logical topology into physical topology,and bridge the gap between the virtual world and real world.First the concept of IP alias resolution was introduced and the classical IP alias relationships were analyzed.Then the IPv4 alias resolution algorithms and the IPv6 alias resolution algorithms were discussed in detail separately.Finally,through the comprehensive analysis and comparison of all the algorithms,the research directions in the future especially in IPv6 alias resolution were pointed out in three folds such as alias target set selection,fingerprint selection and inference methods.…”
Get full text
Article -
211
Application of Interactive Multi-Biometrics Recognition on E-Commerce
Published 2015-10-01“…An interactive multi-biometrics recognition method was proposed,and its application on e-commerce was researched from third-party payment platform.For our interactive multi-biometrics recognition,the identification of users was accomplished with the recognition of multi-biometrics features like nose,ear,and finger-knuckle-print.Payment confirmation and signature were achieved with interactive face scan and fingerprint identification.A frame of third party payment platform was designed,based on which a simple and light-weighted pre-authentication layered model for online payment was established.This model can well guarantee security and reliability of payers,sellers,and banks,simplify the process of payment for users as well.…”
Get full text
Article -
212
Association and application in XDR and MR data
Published 2019-04-01“…Based on the XDR and MR data records of O domain and combining with the development and practice in big data and machine learning technologies,the analysis of impact factors of correlation rate and accuracy was described in detail via practice with the help of technology of association of XDR and MR data records.By means of the integration of machine learning technology and fingerprint localization algorithm,the position accuracy was promoted constantly using the random forest algorithm,and the rasterization of associated data was realized.Simultaneously,the innovative application scenarios and directions applied to planning,network,customer and market were proposed.Finally,to verify the prospect of the association of XDR and MR data records,two examples in network construction,maintain and market were enumerated.…”
Get full text
Article -
213
Genotyping <em> Escherichia coli </em> O157:H7 strains isolated from cattle and small ruminants in Fars province (Iran) using Enterobacterial Repetitive Intergenic Consensus PCR A...
Published 2024-11-01“…Results: The genetic relationships and potential cross-contamination among isolates were evaluated using the fingerprint patterns obtained. Their similarities ranged from 46% to 100%. …”
Get full text
Article -
214
Molecular Vibration-Activity Relationship in the Agonism of Adenosine Receptors
Published 2013-12-01“…The resulting dendrogram was compared with those of another kind of fingerprint or descriptor. The dendrogram result produced by corralled intensity of molecular vibrational frequency outperformed four other analyses in the current study of adenosine receptor agonism and antagonism. …”
Get full text
Article -
215
Automated class student counting through image processing
Published 2021-03-01“…Standard biometrics such as fingerprint and iris recognition have been used in automated systems in recent years. …”
Get full text
Article -
216
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
Published 2014-09-01“…After analyzing the current dynamic password shortcomings, a dynamic password authentication scheme based on improved mobile phone token to challenge / response was proposed. It uses fingerprint as the evidence of token, and can be two-way authentication, and has segment of double channel encryption communication. …”
Get full text
Article -
217
Serum and plasma as a good candidates of body fluids for detection lung cancer by FTIR liquid biopsy
Published 2024-12-01“…Moreover, it was also showed that fingerprint range gave a better distinction between the studied patient groups than the lipid range. …”
Get full text
Article -
218
IoT business guarantee method based on behavioral portrait
Published 2021-05-01“…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
Get full text
Article -
219
Origin of Meteoric Fluids in Extensional Detachments
Published 2020-01-01“…Extension or rapid exhumation, such as that experienced by metamorphic core complexes, which results in decompression or fluid heating can release these old “meteoric” fluids, of which we find the isotopic fingerprint in veins and shear zone minerals.…”
Get full text
Article -
220
Indoor positioning algorithm research based on the typicality judgment of RSS
Published 2014-11-01“…In the process of indoor location based on RSS fingerprint,the quality of the obtained similar point set is a key factor for a successful position.And the locating point’s RSS is an important reason which affects the quality of the similar point set.By analyzing the distribution of D-RSS,the concept of RSS’s typicality was proposed firstly,and an indoor localization algorithm based on typicality judgment of RSS was also presented.According to the principle that the RSS values and the effective similar sample points,a typicality discrimination method for RSS values and a self-adapting K value were presented.Confirmed by the experiments,the algorithm not only can find the effective similarity sample points completely,but also can eliminate the non-substantive similarities points,and then can adapt to the different scenes,then have the higher positioning accuracy.…”
Get full text
Article