The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Impulse-Radio Ultra Wideband (IR-UWB) is a promising technology for indoor localization due to its robustness against multipath interference. In this paper, to deal with the synchronization requirement among anchors in traditional time-difference-of-arrival (TDOA) localization, which is difficult to achieve, an asynchronous time-difference-of-arrival (TDOA) localization method is proposed. The theoretical...
Requirement Engineering is now established is the most critical phase in software engineering and development due to the fact that success or failure of any project depends greatly on wise and correct decisions made and strategies adopted during this phase. However, the great irony is that most of the requirement engineering still relies on outdated, manual and flawed strategies of past decades. The...
Cooperative positioning is an emerging topic in wireless sensor networks and navigation. It can improve the positioning accuracy and coverage in GPS-challenged conditions such as inside tunnels, in urban canyons, and indoors. Different algorithms have been proposed relying on iteratively exchanging and updating positional information. For the purpose of computational complexity, network traffic, and...
This paper explores Bhattacharyya Distance principle and introduces it to recognize stego algorithms in use. First of all, we select the most important features by the means of applying Bhattacharyya distance. Then, BP neural network is used to classify cover and stego images. Extensive experimental works show that the proposed schemes have satisfactory performance on Jpeg steganography like F5, Outguess,...
The world have witnessed an explosive growth in the information available on the World Wide Web (WWW) over the last decade and people use it than ever before. With the everyday increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. True identification of computer file...
A new steganalysis method is proposed to detect the exists of hidden information using character substitution in texts. This is done by utilizing Support Vector Machine (SVM) as a classifier to classify the characteristic vector input into SVM. The most important step of this detection algorithm is the construction of a proper characteristic vector. Under the prerequisite that the secret bits to be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.