نتایج جستجو برای: vulnerable scanner

تعداد نتایج: 71901  

Journal: :Health Expectations 2016

Journal: :Electronics 2021

The Internet of Things (IoT) technology is rapidly being applied to real life, but the application a corresponding secure and convenient authentication method still in significant challenge. So far, pattern, password fingerprint are most used methods, it important address various security vulnerabilities limitations these approaches. In case recognition, additional hardware such as scanner requ...

2008
Cynthia M. Stonnington Geoffrey C. Y. Tan Stefan Klöppel Carlton Chu Bogdan Draganski Clifford R. Jack Kewei Chen John Ashburner Richard S. Frackowiak

Large, multi-site studies utilizing MRI-derived measures from multiple scanners present an opportunity to advance research by pooling data. On the other hand, it remains unclear whether or not the potential confound introduced by different scanners and upgrades will devalue the integrity of any results. Although there are studies of scanner differences for the purpose of calibration and quality...

Journal: :J. Electronic Imaging 2009
Changming Sun Richard Beare Kevin Cheong Brian J. Jung Maverick Kim

bstract. 3-D scanning has become increasingly popular in a wide ange of applications. We present a prototype 3-D/stereoscopic canning system based on a cheap, readily available flatbed scaner. Stereoscopic imaging is achieved by modifying the optical path f the ordinary flatbed scanner. The results of 3-D imaging using our rototype system are demonstrated, and a number of design lternatives are...

2012
K. Goda A. Mahjoubfar C. Wang A. Fard J. Adam D. R. Gossett A. Ayazi E. Sollier O. Malik E. Chen Y. Liu R. Brown N. Sarkhosh D. Di Carlo B. Jalali

Laser scanning technology is one of the most integral parts of today's scientific research, manufacturing, defense, and biomedicine. In many applications, high-speed scanning capability is essential for scanning a large area in a short time and multi-dimensional sensing of moving objects and dynamical processes with fine temporal resolution. Unfortunately, conventional laser scanners are often ...

2016
Anil Kumar Konasale Krishna Robert Ricci

Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners...

2008
Andrew Walenstein

The nonzero "response time" of AV technologies offers a lacuna for hackers to exploit. By the time an AV company responds with a signature to detect a malicious sample, a hacker may release thousands of new variants. We present a self-learning AV scanner that effectively zeroes the response time needed to detect variants. The scanner uses methods from information retrieval research to determine...

2010
S. A. Orjuela E. Vansteenkiste

In this paper we present a novel 3D scanner to capture the texture characteristics of worn carpets into images of the depth. We first compare our proposed scanner to a Metris scanner previously attempted for this application. Then, we scan the surface of samples from the standard EN1471 using our proposed scanner. We found that our proposed scanner offers additional benefits because it has been...

2010
Jason E. Matney Brent C. Parker Daniel W. Neck Greg Henkelmann Isaac I. Rosen

The purpose of this study was to quantify the performance and assess the utility of two different types of scanners for radiochromic EBT film dosimetry: a commercial flatbed document scanner and a widely used radiographic film scanner. We evaluated the Epson Perfection V700 Photo flatbed scanner and the Vidar VXR Dosimetry Pro Advantage scanner as measurement devices for radiochromic EBT film. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید