Showing 341 - 360 results of 461 for search '"fingerprint"', query time: 0.04s Refine Results
  1. 341

    Multidimensional Optimization of Signal Space Distance Parameters in WLAN Positioning by Milenko Brković, Mirjana Simić

    Published 2014-01-01
    “…Among the localization algorithms, nearest neighbor fingerprinting algorithms based on Received Signal Strength (RSS) parameter have been extensively studied as an inexpensive solution for delivering indoor Location Based Services (LBS). …”
    Get full text
    Article
  2. 342
  3. 343

    Volatile Profile Characterization of Winter Jujube from Different Regions via HS-SPME-GC/MS and GC-IMS by Yening Qiao, Jinfeng Bi, Qinqin Chen, Xinye Wu, Min Gou, Haonan Hou, Xinwen Jin, Giorgia Purcaro

    Published 2021-01-01
    “…A combined untargeted and targeted approach was established for fingerprinting volatile organic compounds in winter jujubes from eight regions of China. …”
    Get full text
    Article
  4. 344

    Forensic technology: concepts, objectives and principles by V. M. Kyselov

    Published 2023-12-01
    “…Forensic technology is based on scientific principles and technologies and includes many different methods, such as ballistics, fingerprinting, DNA analysis, document examination, photography, video recording, etc. …”
    Get full text
    Article
  5. 345

    Composite Tor traffic features extraction method of webpage in actual network flow based on SDN by Hongping YAN, Qiang ZHOU, Shihao WANG, Wang YAO, Liukun HE, Liangmin WANG

    Published 2022-03-01
    “…Website fingerprinting (WF) methods for Tor webpage traffic are often based on the separated Tor traffic or even the separated Tor webpage traffic.However, distinguishing Tor traffic from the original traffic of the actual network and Tor webpage traffic from the Tor traffic costs amount of computation, which is more difficult than the WF attack itself.According to the current architecture of the Internet and the characteristics of network traffic converging to regional central nodes, the bi-directional statistical feature (BSF) was proposed for distinguishing Tor traffic through the intra-domain global perspective provided by the SDN structure of the central node and the node information disclosed by the Tor network.Furthermore, a hidden feature extraction method for Web traffic based on lifted structure fingerprinting (LSF) was proposed, and a composited Tor-webpage-identification traffic feature (CTTF) was proposed based on BSF and LSF deep features.For solving the problem of traffic training data scarcity, a traffic data augmentation method based on translation was proposed, which made the augmented traffic data as consistent as the Tor traffic data captured in the real working environment.The experimental results show that the identification rate based on CTTF can be improved by about 4% compared with using only the original data features.When there is less training data, the classification accuracy is improved more obvious after using the traffic data augmentation method, and the false positive rate can be effectively reduced.…”
    Get full text
    Article
  6. 346

    Simultaneous Recognition of Species, Quality Grades, and Multivariate Calibration of Antioxidant Activities for 12 Famous Green Teas Using Mid- and Near-Infrared Spectroscopy Coupl... by Haiyan Fu, Ou Hu, Lu Xu, Yao Fan, Qiong Shi, Xiaoming Guo, Wei Lan, Tianming Yang, Shunping Xie, Yuanbin She

    Published 2019-01-01
    “…In this paper, mid- and near-infrared spectroscopy fingerprints were combined to simultaneously discriminate 12 famous green teas and quantitatively characterize their antioxidant activities using chemometrics. …”
    Get full text
    Article
  7. 347

    GENETIC DIVERSITY INVESTIGATION AND MOLECULAR MARKERS ESTABLISHMENT FOR IDENTIFICATION OF SEVERAL INITIALLY SELECTIVE AVOCADO (Persea americana Miller) STRAINS IN LAMDONG PROVINCE by Lê Ngọc Triệu, Nguyễn Hoàng Phong, Mai Tiến Đạt, Thái Thạch Bích, Nguyễn Thanh Tiền, Lê Đình Vĩnh Bảo, Nguyễn Khắc Quang, Phan Ngọc Quỳnh Như

    Published 2017-01-01
    “…Also with the same 10 ISSR primers, DNA fingerprints recorded from 18 samples (3 samples per strain) including 98 electrophoresis DNA band were used for identification 06 investigated avocado strains. …”
    Get full text
    Article
  8. 348

    Transformer-generated atomic embeddings to enhance prediction accuracy of crystal properties with machine learning by Luozhijie Jin, Zijian Du, Le Shu, Yan Cen, Yuanfeng Xu, Yongfeng Mei, Hao Zhang

    Published 2025-01-01
    “…Here, we proposed an atomic embedding strategy called universal atomic embeddings (UAEs) for their broad applicability as atomic fingerprints, and generated the UAE tensors based on the proposed CrystalTransformer model. …”
    Get full text
    Article
  9. 349

    Metabolic studies of Ogataea polymorpha using nine different corn steep liquors by Sekar Mayang W. Wahjudi, Dominik Engel, Jochen Büchs

    Published 2025-01-01
    “…Conclusions This study shows the versatility of CSL as an alternative nutrient source for O. polymorpha cultivations. “Fingerprinting” of CSL batches allows for early screening. …”
    Get full text
    Article
  10. 350

    Harnessing the Power of Machine Learning Guided Discovery of NLRP3 Inhibitors Towards the Effective Treatment of Rheumatoid Arthritis by Sidra Ilyas, Abdul Manan, Chanyoon Park, Hee-Geun Jo, Donghun Lee

    Published 2024-12-01
    “…PubChem and MACCS fingerprints were used to predict the inhibitory activities of the compounds. …”
    Get full text
    Article
  11. 351
  12. 352

    Identification technology for city freeway users based on XDR big data analysis by Baoyou WANG, Saibin YAO, Jiucheng HUANG, Hui PAN

    Published 2021-11-01
    “…In the scene of city freeway, the driving speed is relatively faster, the flow of people is denser, and the customers have higher requirements for communication experience.Firstly, the architecture of big data platform for mobile network quality control was introduced.Then, the identification algorithm for city freeway users based on XDR big data analysis was proposed.Finally, through XDR big data analyzing and processing, the user track on freeway was output, which followed by matching with the fingerprints database of freeways.The identification accuracy for city freeway users was improved, and wireless network quality monitoring of city freeways was supported.…”
    Get full text
    Article
  13. 353

    Genetic Passport System for Captive Falcons – Saker, Gyrfalcon and Peregrine Falcon Conservation Prospects in Russia. by Ludmila S. Zinevich, Darya N. Rozhkova, Mikhail I. Iljin, Alexander G. Sorokin

    Published 2023-10-01
    “…First forensic testing of the rare animal species DNA occurred in 1991 in Great Britain, when the case of illegal capture of the Peregrine Falcon (Falco peregrinus) chicks was proved by parentage testing using DNA fingerprints of birds in question and other peregrines in captivity (Shorrock, 1998). …”
    Get full text
    Article
  14. 354

    Survey of side channel attack on encrypted network traffic by Ding LI, Yuefei ZHU, Bin LU, Wei LIN

    Published 2021-08-01
    “…By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development.…”
    Get full text
    Article
  15. 355

    MGATAF: multi-channel graph attention network with adaptive fusion for cancer-drug response prediction by Dhekra Saeed, Huanlai Xing, Barakat AlBadani, Li Feng, Raeed Al-Sabri, Monir Abdullah, Amir Rehman

    Published 2025-01-01
    “…MGATAF improves drug representation by integrating SMILES and fingerprints, resulting in more precise predictions of drug effects. …”
    Get full text
    Article
  16. 356

    MDFGNN-SMMA: prediction of potential small molecule-miRNA associations based on multi-source data fusion and graph neural networks by Jianwei Li, Xukun Zhang, Bing Li, Ziyu Li, Zhenzhen Chen

    Published 2025-01-01
    “…Firstly, MDFGNN-SMMA extracted features of Atom Pairs fingerprints and Molecular ACCess System fingerprints to derive fusion feature vectors for small molecules (SMs). …”
    Get full text
    Article
  17. 357

    Indoor Pedestrian Positioning Tracking Algorithm with Sparse Anchor Nodes by Zhou Yong, Cai Zehui, Chen Pengpeng

    Published 2013-08-01
    “…In order to solve the indoor pedestrian positioning and tracking problems under the condition of sparse anchor nodes, this paper presents a new tracking scheme which predicts the staff position under the condition of indoor location fingerprints based on particle filter. In the proposed algorithm, the indoor topology is adopted to constrain and correct the results. …”
    Get full text
    Article
  18. 358

    Distinguishing Smilax glabra and Smilax china rhizomes by flow-injection mass spectrometry combined with principal component analysis by Liang Jian, Zhou Meng, Li Lin-Yu, Shu Ji-Cheng, Liang Yong-Hong, Li Feng-Qin, Xiong Li, Huang Hui-Lian

    Published 2018-03-01
    “…The proposed method employed an electrospray-time-of-flight MS. The MS fingerprints were analyzed using principal component analysis (PCA) and orthogonal partial least squares discriminant analysis (OPLS-DA) with the aid of SIMCA software. …”
    Get full text
    Article
  19. 359

    Genetic polymorphism of local Abkhazian grape cultivars by E. T. Ilnitskaya, M. V. Makarkina, I. V. Stepanov, I. I. Suprun, S. V. Tokmakov, V. Ch. Aiba, M. A. Avidzba, V. K. Kotlyar

    Published 2022-01-01
    “…The obtained DNA profiles of the Abkhazian cultivars were checked for compliance with DNA-fingerprints of grape varieties in the Vitis International Variety Catalogue. …”
    Get full text
    Article
  20. 360

    A Comparative Study of Cross-Device Finger Vein Recognition Using Classical and Deep Learning Approaches by Tuğçe Arıcan, Raymond Veldhuis, Luuk Spreeuwers, Loïc Bergeron, Christoph Busch, Ehsaneddin Jalilian, Christof Kauba, Simon Kirchgasser, Sébastien Marcel, Bernhard Prommegger, Kiran Raja, Raghavendra Ramachandra, Andreas Uhl

    Published 2024-01-01
    “…The findings emphasise the importance of standardisation of finger vein recognition, similar to that of fingerprints or irises, crucial for achieving inter-operability. …”
    Get full text
    Article