Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-8 of 8 total results
 Facial Recognition using OpenCV
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
 Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Hiding Malicious Content in PDF Documents
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 121 other file format. This will not invalidate the digital signature, as no bits of the actual file were altered. This met hod is known as the Dali Attack, named after the famous painter [4], [5]. The first demonstration of the attack was
https://arxiv.org/pdf/1201.0397
Average Rating (0 votes)
2D Barcode for DNA Encoding - arXiv
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 145 The default sub-mode is "Uppercase", in this sub-mode 2 characters are encoded in each CW, here is the characters table 2: Table 2.Characters value for high-level encoding in text mode Value Uppercase Lowercase Mixed Punctuation 0 A a 0 ;
https://arxiv.org/pdf/1201.0394
Average Rating (0 votes)
 Smart Cards Applications in the Healthcare System
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 63 reader. The computer runs a software application with which the doctor saves patient information in to the smartcard. Reading or writing the smartcard is made securely, because each time for accessing
 Approaches on Internet of Things Solutions
Journal of Mobile, Embedded and Distributed Systems, vol. V, no. 3, 2013 ISSN 2067 – 4074 125 Figure 1. Internet of Things components A Smart Object contains IoT data and information, also metadata and software agent code resources, such as application software event handler. Samples of Smart Objects are
Future Developments in Non-Repudiation in GSM WAP ...
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Page 23 Fig. 2. GSM Mobile Equipment Structure The GSM evolution is based on this infrastructure and the security of the entire system depends on many factors. 2. GSM Voice and Data Security
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...