Showing 221 - 240 results of 461 for search '"fingerprint"', query time: 0.04s Refine Results
  1. 221

    Fully Connected Neural Networks Ensemble with Signal Strength Clustering for Indoor Localization in Wireless Sensor Networks by Marcin Bernas, Bartłomiej Płaczek

    Published 2015-12-01
    “…The paper introduces a method which improves localization accuracy of the signal strength fingerprinting approach. According to the proposed method, entire localization area is divided into regions by clustering the fingerprint database. …”
    Get full text
    Article
  2. 222

    Indoor BLE and MEMS based multi-floor fusion positioning algorithm by Mu ZHOU, Bin WANG, Zeng-shan TIAN, Qian-kun ZHANG

    Published 2017-05-01
    “…Based on the data fusion from micro electro mechanical system (MEMS) sensors and low-power bluetooth (BLE),an indoor BLE and MEMS based multi-floor positioning algorithm was proposed.First of all,the affinity propagation clustering,outlier detection and received signal strength indicator (RSSI) filtering algorithms were applied to denoise the fingerprint database.Second,by using the extended Kalman filter,the robust M estimation algorithm was used to perform the optimal estimation of the two-dimensional target position.Finally,the barometer output and geographical position information was considered to realize the height estimation of the target.The experimental results show that the proposed system is able to achieve the horizontal and vertical positioning errors lower than 0.7 m and 0.35 m respectively in multi-floor fusion positioning.…”
    Get full text
    Article
  3. 223

    Cell-phone origin identification based on spectral features of device self-noise by Anshan PEI, Rangding WANG, Diqun YAN

    Published 2017-01-01
    “…With the widespread availability of cell-phone recording devices and the availability of various powerful and easy-to-use digital media editing software,source cell-phone identification has become a hot topic in multimedia forensics.A novel cell-phone identification method was proposed based on the recorded speech.Firstly,device self-noise (DSN) was considered as the fingerprint of the cell-phone and estimated from the silent segments of the speech.Then,the mean of the noise's spectrum was extracted as the identification.Principal components analysis (PCA) was applied to reduce the feature dimension.Support vector machine (SVM) was adopted as the classifier to determine the source of the detecting speech.Twenty-four popular models of the cell-phones were evaluated in the experiment.The experimental results show that the average identification accuracy and recall of the method can reach up to 99.24% and demonstrate that the self-noise feature has more superior performance than the MFCC feature.…”
    Get full text
    Article
  4. 224

    A hybrid indoor localization algorithm based on RSSI and inertial navigation by Yaping ZHU, Weiwei XIA, Yueyue ZHANG, Feng YAN, Xuzhou ZUO, Lianfeng SHEN

    Published 2017-10-01
    “…To cater for the requirements of high-precision indoor localization algorithms,a hybrid indoor localization algorithm based on received signal strength identification (RSSI) and inertial navigation was proposed.This algorithm used fingerprint identification algorithm to localize the agents,based on the RSSI values of ZigBee nodes in wireless sensor network.The algorithm combined the inertial information provided by inertial measurement units (IMU),to correct the RSSI localization results.This algorithm used Kalman filter and adopted state equations to describe the dynamic change rules of agents’ positions,thus it achieved a hybrid localization algorithm which relied WSN localization first and IMU last.Simulations evaluate that the proposed algorithm can improve the localization performances of algorithms which adopt RSSI localization and inertial navigation individually,and can greatly improve localization accuracy.…”
    Get full text
    Article
  5. 225
  6. 226
  7. 227

    Gait Correlation Analysis Based Human Identification by Jinyan Chen

    Published 2014-01-01
    “…Human gait identification aims to identify people by a sequence of walking images. Comparing with fingerprint or iris based identification, the most important advantage of gait identification is that it can be done at a distance. …”
    Get full text
    Article
  8. 228

    Covert Channel Construction Method Based on HTTP Composite Protocols by Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li

    Published 2022-01-01
    “…Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. …”
    Get full text
    Article
  9. 229

    Accurate Identification of Cancerlectins through Hybrid Machine Learning Technology by Jieru Zhang, Ying Ju, Huijuan Lu, Ping Xuan, Quan Zou

    Published 2016-01-01
    “…In this study, various protein fingerprint features and advanced classifiers, including ensemble learning techniques, were utilized to identify this group of proteins. …”
    Get full text
    Article
  10. 230

    Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata by Wen-bin YAO, Peng-di YE, Xiao-yong LI, Jing-kun CHANG

    Published 2015-08-01
    “…Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples with high similarity,a deduplication algorithm based on condensed nearest neighbor rule,which was called Dedup<sup>2</sup>,was proposed.Dedup<sup>2</sup>uses clustering algorithm to divide the original deduplication metadata into several categories.According to these categories,it employs condensed nearest neighbor rule to remove the highest similar data in the deduplication metadata.After that it can get the subset of deduplication metadata.Based on this subset,new data objects will be deduplicated based on the principle of data similarity.The results of experiments show that Dedup<sup>2</sup>can reduce the size of deduplication data set more than 50% effectively while maintain similar deduplication ratio.…”
    Get full text
    Article
  11. 231

    Passive IoT-based positioning technology development status and evolutionary trends by QIAN Hongyu, LI Yuan, WANG Qing, WANG Yamin, XIAO Shanpeng

    Published 2024-07-01
    “…On the basis of analyzing the principles and characteristics of different positioning technologies, the latest research progress of passive IoT positioning was introduced, and the passive IoT positioning technologies were summarized into three categories: geometrical measurement-based positioning methods, fingerprint feature-based positioning methods, and imaging technology-based positioning methods, according to their implementation principles. …”
    Get full text
    Article
  12. 232

    Pinched hysteresis loops in non‐linear resonators by Ahmed S. Elwakil, Mohammed E. Fouda, Sohaib Majzoub, Ahmed G. Radwan

    Published 2021-03-01
    “…The formation of a pinched loop in these circuits confirms the following: (1) pinched hysteresis is not a fingerprint of memristors, and (2) the existence of a non‐linearity is essential for generating this behaviour. …”
    Get full text
    Article
  13. 233

    Single-cell analysis of Mycobacterium tuberculosis with diverse drug resistance using surface-enhanced Raman spectroscopy (SERS) by Andrey Zyubin, Anastasia Lavrova, Marine Dogonadze, Evgenii Borisov, Eugene B. Postnikov

    Published 2025-01-01
    “…In this work, we investigated individual bacteria M. tuberculosis belonging to strains of the Beijing family with different drug sensitivity (sensitive, multi and extensive drug-resistant) by surface-enhanced Raman spectroscopy (SERS) in the fingerprint region. The latter is focused on the spectral bands, which correspond to a set of glutathione bands and DNA methylation patterns revealed due to 5-methylcytosine spectral biomarkers. …”
    Get full text
    Article
  14. 234

    CFA-Based Splicing Forgery Localization Method via Statistical Analysis by Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li

    Published 2024-01-01
    “…The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. …”
    Get full text
    Article
  15. 235

    Cultivation of Innovative Ability of College Physical Education Students Based on the Internet of Things Multimedia Environment by Bin Cai

    Published 2022-01-01
    “…In this paper, a terminal collaborative indoor positioning algorithm based on RSSI fingerprint optimization was proposed to study the innovation ability of physical education students in colleges and universities. …”
    Get full text
    Article
  16. 236

    Background Information Self-Learning Based Hyperspectral Target Detection by Yufei Tian, Jihai Yang, Shijun Li, Wenning Xu

    Published 2018-01-01
    “…It is especially designed to extract fingerprint and tumor region from hyperspectral biologic images. …”
    Get full text
    Article
  17. 237

    Bio-screening and quantification of methyl paraben in vinegar and coconut juice separated by HPTLC by Yisheng Chen, Xingjun Xi

    Published 2024-05-01
    “…Finally, the suspected result was confirmed by determining its MS fingerprint, further strengthening the reliability of screening.…”
    Get full text
    Article
  18. 238

    An Analytical Study on the Most Important Methods and Data Sets Used to Identify People Through ECG: Review by Abdullah Najm Abed Alzaki, Mohammed Al-Tamimi

    Published 2024-06-01
    “… The electrocardiogram is a topic of great importance from a medical and biometric perspective, especially recently, as researchers have begun to search for new biometric methods other than the palm print, fingerprint, or iris as alternative systems. Researchers discovered that ECG has unique features that are not common among humans, making it a good topic for researchers in biometric systems for identifying people. …”
    Get full text
    Article
  19. 239

    Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service by Jiaxing Qu, Guoyin Zhang, Zhou Fang

    Published 2017-01-01
    “…In this paper, we design a Prophet framework, which provides an effective security scheme for users sharing their location information. First, we define fingerprint identification based on Markov chain and state classification to describe the users’ behavior patterns. …”
    Get full text
    Article
  20. 240

    Identification of Potential Biomarkers and Metabolic Changes in the Serum of Breast Lump Patients Among Kelantanese Based on 1H NMR Metabolomics by Ahmad Zulkefly, Wan Norlina Wan Azman, Julia Omar, Nurul Syakima Ab Mutalib, Desy Fitrya Syamsumir, M Maulidiani, Faridah Abas, Maya Mazuwin Yahya, Muhamad Syahmi Yamin, Wan Faiziah Wan Abdul Rahman, Tengku Ahmad Damitri Al-Astani Tengku Din

    Published 2023-12-01
    “… This case-control study, conducted at the Hospital USM BestARi unit, aimed to identify the serum metabolic fingerprint among individuals with breast lumps and healthy controls, and to discover potential biomarkers. …”
    Get full text
    Article