Now showing items 31-36 of 36
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing
(IEEE-INST Electrical Electronics Engineers Inc., 2015-03)
The photo response non-uniformity noise associated with an imaging sensor has been shown to be a unique and persistent identifier that can be treated as the sensor's digital fingerprint. The method for attributing an image ...
Carving Orphaned JPEG File Fragments
File carving techniques allow for recovery of files from storage devices in the absence of any file system metadata. When data are encoded and compressed, the current paradigm of carving requires the knowledge of the ...
Employing social network analysis for disease biomarker detection
(Inderscience Enterprises Ltd., 2015)
Detection of disease biomarkers in general and cancer biomarkers in particular is an important task which has received considerable attention in the area of in silico genomic experiments. We describe a new approach for ...
Punctured interval broadcast encryption scheme with free riders
In Broadcast Encryption (BE) schemes, the problem is to encrypt a content for a group of dynamically changing privileged (subscriber) subset within a receiver population. A popular approach is to carefully distribute a ...
Brilliant blue G assisted macular surgery: the effect of air infusion on contrast recognisability in internal limiting membrane peeling
(BMJ Publishing Group, 2015-01)
Background To evaluate the potential efficacy and safety of inner limiting membrane (ILM) staining with brilliant blue G (BBG) under air infusion. Methods 63 patients, treated by one surgeon with macular hole or idiopathic ...
Optimal Base Station Mobility Patterns for Wireless Sensor Network Lifetime Maximization
(IEEE-INST Electrical Electronics Engineers Inc., 2015-11)
Maximization of network lifetime through the efficient utilization of energy is one of the main objectives in wireless sensor network (WSN) design. Although energy balancing throughout the network for relaying the data ...