-
341
Multidimensional Optimization of Signal Space Distance Parameters in WLAN Positioning
Published 2014-01-01“…Among the localization algorithms, nearest neighbor fingerprinting algorithms based on Received Signal Strength (RSS) parameter have been extensively studied as an inexpensive solution for delivering indoor Location Based Services (LBS). …”
Get full text
Article -
342
Screening hepatoprotective effective components of Lonicerae japonica Flos based on the spectrum-effect relationship and its mechanism exploring
Published 2023-01-01“…Fingerprints of ten batches of LF were established by UPLC-PDA. …”
Get full text
Article -
343
Volatile Profile Characterization of Winter Jujube from Different Regions via HS-SPME-GC/MS and GC-IMS
Published 2021-01-01“…A combined untargeted and targeted approach was established for fingerprinting volatile organic compounds in winter jujubes from eight regions of China. …”
Get full text
Article -
344
Forensic technology: concepts, objectives and principles
Published 2023-12-01“…Forensic technology is based on scientific principles and technologies and includes many different methods, such as ballistics, fingerprinting, DNA analysis, document examination, photography, video recording, etc. …”
Get full text
Article -
345
Composite Tor traffic features extraction method of webpage in actual network flow based on SDN
Published 2022-03-01“…Website fingerprinting (WF) methods for Tor webpage traffic are often based on the separated Tor traffic or even the separated Tor webpage traffic.However, distinguishing Tor traffic from the original traffic of the actual network and Tor webpage traffic from the Tor traffic costs amount of computation, which is more difficult than the WF attack itself.According to the current architecture of the Internet and the characteristics of network traffic converging to regional central nodes, the bi-directional statistical feature (BSF) was proposed for distinguishing Tor traffic through the intra-domain global perspective provided by the SDN structure of the central node and the node information disclosed by the Tor network.Furthermore, a hidden feature extraction method for Web traffic based on lifted structure fingerprinting (LSF) was proposed, and a composited Tor-webpage-identification traffic feature (CTTF) was proposed based on BSF and LSF deep features.For solving the problem of traffic training data scarcity, a traffic data augmentation method based on translation was proposed, which made the augmented traffic data as consistent as the Tor traffic data captured in the real working environment.The experimental results show that the identification rate based on CTTF can be improved by about 4% compared with using only the original data features.When there is less training data, the classification accuracy is improved more obvious after using the traffic data augmentation method, and the false positive rate can be effectively reduced.…”
Get full text
Article -
346
Simultaneous Recognition of Species, Quality Grades, and Multivariate Calibration of Antioxidant Activities for 12 Famous Green Teas Using Mid- and Near-Infrared Spectroscopy Coupl...
Published 2019-01-01“…In this paper, mid- and near-infrared spectroscopy fingerprints were combined to simultaneously discriminate 12 famous green teas and quantitatively characterize their antioxidant activities using chemometrics. …”
Get full text
Article -
347
GENETIC DIVERSITY INVESTIGATION AND MOLECULAR MARKERS ESTABLISHMENT FOR IDENTIFICATION OF SEVERAL INITIALLY SELECTIVE AVOCADO (Persea americana Miller) STRAINS IN LAMDONG PROVINCE
Published 2017-01-01“…Also with the same 10 ISSR primers, DNA fingerprints recorded from 18 samples (3 samples per strain) including 98 electrophoresis DNA band were used for identification 06 investigated avocado strains. …”
Get full text
Article -
348
Transformer-generated atomic embeddings to enhance prediction accuracy of crystal properties with machine learning
Published 2025-01-01“…Here, we proposed an atomic embedding strategy called universal atomic embeddings (UAEs) for their broad applicability as atomic fingerprints, and generated the UAE tensors based on the proposed CrystalTransformer model. …”
Get full text
Article -
349
Metabolic studies of Ogataea polymorpha using nine different corn steep liquors
Published 2025-01-01“…Conclusions This study shows the versatility of CSL as an alternative nutrient source for O. polymorpha cultivations. “Fingerprinting” of CSL batches allows for early screening. …”
Get full text
Article -
350
Harnessing the Power of Machine Learning Guided Discovery of NLRP3 Inhibitors Towards the Effective Treatment of Rheumatoid Arthritis
Published 2024-12-01“…PubChem and MACCS fingerprints were used to predict the inhibitory activities of the compounds. …”
Get full text
Article -
351
-
352
Identification technology for city freeway users based on XDR big data analysis
Published 2021-11-01“…In the scene of city freeway, the driving speed is relatively faster, the flow of people is denser, and the customers have higher requirements for communication experience.Firstly, the architecture of big data platform for mobile network quality control was introduced.Then, the identification algorithm for city freeway users based on XDR big data analysis was proposed.Finally, through XDR big data analyzing and processing, the user track on freeway was output, which followed by matching with the fingerprints database of freeways.The identification accuracy for city freeway users was improved, and wireless network quality monitoring of city freeways was supported.…”
Get full text
Article -
353
Genetic Passport System for Captive Falcons – Saker, Gyrfalcon and Peregrine Falcon Conservation Prospects in Russia.
Published 2023-10-01“…First forensic testing of the rare animal species DNA occurred in 1991 in Great Britain, when the case of illegal capture of the Peregrine Falcon (Falco peregrinus) chicks was proved by parentage testing using DNA fingerprints of birds in question and other peregrines in captivity (Shorrock, 1998). …”
Get full text
Article -
354
Survey of side channel attack on encrypted network traffic
Published 2021-08-01“…By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development.…”
Get full text
Article -
355
MGATAF: multi-channel graph attention network with adaptive fusion for cancer-drug response prediction
Published 2025-01-01“…MGATAF improves drug representation by integrating SMILES and fingerprints, resulting in more precise predictions of drug effects. …”
Get full text
Article -
356
MDFGNN-SMMA: prediction of potential small molecule-miRNA associations based on multi-source data fusion and graph neural networks
Published 2025-01-01“…Firstly, MDFGNN-SMMA extracted features of Atom Pairs fingerprints and Molecular ACCess System fingerprints to derive fusion feature vectors for small molecules (SMs). …”
Get full text
Article -
357
Indoor Pedestrian Positioning Tracking Algorithm with Sparse Anchor Nodes
Published 2013-08-01“…In order to solve the indoor pedestrian positioning and tracking problems under the condition of sparse anchor nodes, this paper presents a new tracking scheme which predicts the staff position under the condition of indoor location fingerprints based on particle filter. In the proposed algorithm, the indoor topology is adopted to constrain and correct the results. …”
Get full text
Article -
358
Distinguishing Smilax glabra and Smilax china rhizomes by flow-injection mass spectrometry combined with principal component analysis
Published 2018-03-01“…The proposed method employed an electrospray-time-of-flight MS. The MS fingerprints were analyzed using principal component analysis (PCA) and orthogonal partial least squares discriminant analysis (OPLS-DA) with the aid of SIMCA software. …”
Get full text
Article -
359
Genetic polymorphism of local Abkhazian grape cultivars
Published 2022-01-01“…The obtained DNA profiles of the Abkhazian cultivars were checked for compliance with DNA-fingerprints of grape varieties in the Vitis International Variety Catalogue. …”
Get full text
Article -
360
A Comparative Study of Cross-Device Finger Vein Recognition Using Classical and Deep Learning Approaches
Published 2024-01-01“…The findings emphasise the importance of standardisation of finger vein recognition, similar to that of fingerprints or irises, crucial for achieving inter-operability. …”
Get full text
Article