نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: :Annals of the ICRP 2016
T Schneider J Lochard L Vaillant

The concepts of tolerability and reasonableness are at the core of the International Commission on Radiological Protection (ICRP) system of radiological protection. Tolerability allows the definition of boundaries for implementing ICRP principles, while reasonableness contributes to decisions regarding adequate levels of protection, taking into account the prevailing circumstances. In the 1970s...

2013
M. Senthil Kumar M. Gopinath

The Sinks are vivacious in many wireless sensor network (WSN) solicitations for competent data accumulation, confined sensor reprogramming, and for extricating and revoking conceded sensors. However, in sensor networks that make use of the temporal key dissemination schemes for pairwise key naissance and endorsement between sensor nodes and mobile sinks, the engross of mobile sinks for data ass...

2009
Niladri B. Puhan Anthony Tung Shuen Ho Farook Sattar

In this paper, we propose a high capacity data hiding method in binary document images towards semi-fragile authentication. Achieving high capacity in binary images with strict imperceptibility criterion is found to be a difficult task. In this method, noise type pixels are selected for pixel-wise data embedding using a secret key. The data hiding process through pixel flipping introduces some ...

Journal: :Cybernetics and Information Technologies 2023

Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, strategic means authenticating authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive risk-based. Zero-trust principles are incorporated b...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام صادق علیه السلام - دانشکده الهیات و معارف اسلامی 1391

muhammad ibn muhammad ibn numan, known as "shaykh mufid," one of the great imamiye theologians and jurists in the fourth and early fifth century , had comprehensive mastery of both rational and traditional topics and exerted his influence upon both his contemporary and future scholors. he is considered to be one of the top imamiye scholars who spent his lifetime teaching, learning and authorin...

2013
Chan-Il Woo Seung-Dae Lee

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the propose...

2013
Carmelo Corsaro Domenico Mallamace Joanna Łojewska Francesco Mallamace Luciano Pietronero Mauro Missori

For centuries mankind has stored its knowledge on paper, a remarkable biomaterial made of natural cellulose fibers. However, spontaneous cellulose degradation phenomena weaken and discolorate paper over time. The detailed knowledge of products arising from cellulose degradation is essential in understanding deterioration pathways and in improving durability of cultural heritage. In this study, ...

2002
N. Tsirliganis George Pavlidis Anestis Koutsoudis D. Papadopoulou A. Tsompanopoulos Kostas Stavroglou Z. Loukou Christodoulos Chamzas

Recent developments in 3D technologies and measurement instrumentation combined with multimedia databases offer today new possibilities for the integrated and complete description of Cultural Heritage objects. A first attempt is made to develop a database for archaeological ceramic and glass artifacts where in addition to the digitized 2D and 3D images, description, typological characteristics ...

2008
Hui Fang Nicholas Costen

In this paper we investigate how the use of computational statistical models, derived from moving images, can take part in the face recognition process. As a counterpart to psychological experimental results showing a significant beneficial effect of facial non-rigid movement, two features obtained from face sequences, the central tendency and type of movement variation, are associated to impro...

2013
M. B. Nirmala

The security issue in a wireless sensor network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and to enlarge its maximum supportable network size and to provide good...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید