Web
Education
Viewing 1-8 of 8 total results
Facial Recognition using OpenCV
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Hiding Malicious Content in PDF Documents
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 121 other file format. This will not invalidate the digital signature, as no bits of the actual file were altered. This met hod is known as the Dali Attack, named after the famous painter [4], [5]. The first demonstration of the attack was
2D Barcode for DNA Encoding - arXiv
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 145 The default sub-mode is "Uppercase", in this sub-mode 2 characters are encoded in each CW, here is the characters table 2: Table 2.Characters value for high-level encoding in text mode Value Uppercase Lowercase Mixed Punctuation 0 A a 0 ;
Smart Cards Applications in the Healthcare System
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 63 reader. The computer runs a software application with which the doctor saves patient information in to the smartcard. Reading or writing the smartcard is made securely, because each time for accessing
Approaches on Internet of Things Solutions
Journal of Mobile, Embedded and Distributed Systems, vol. V, no. 3, 2013 ISSN 2067 – 4074 125 Figure 1. Internet of Things components A Smart Object contains IoT data and information, also metadata and software agent code resources, such as application software event handler. Samples of Smart Objects are
Future Developments in Non-Repudiation in GSM WAP ...
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Page 23 Fig. 2. GSM Mobile Equipment Structure The GSM evolution is based on this infrastructure and the security of the entire system depends on many factors. 2. GSM Voice and Data Security
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.