scholarly journals Tracks Matching Based on an Acoustic Spectrum Signature Detection and a Multi-Frame Fusion Algorithms

Author(s):  
Dahai Cheng ◽  
Huigang Xu ◽  
Ruiliang Gong ◽  
Huan Huang
2018 ◽  
Vol 9 (4) ◽  
pp. 13-29
Author(s):  
Dahai Cheng ◽  
Huigang Xu ◽  
Ruiliang Gong ◽  
Huan Huang

2016 ◽  
Vol 1 (1) ◽  
pp. 50-53 ◽  
Author(s):  
Varun Sharma ◽  
Narpat Singh

In the recent research work, the handwritten signature is a suitable field to detection of valid signature from different environment such online signature and offline signature. In early research work, a lot of unauthorized person put the signature and theft the data in illegal manner from organization or industries. So we have to need identify, the right person on the basis of various parameters that can be detected. In this paper, we have proposed two methods namely LDA and Neural Network for the offline signature from the scan signature image. For efficient research, we have focused the comparative analysis in terms of FRR, SSIM, MSE, and PSNR. These parameters are compared with the early work and the recent work. Our proposed work is more effective and provides the suitable result through our method which leads to existing work. Our method will help to find legal signature of authorized use for security and avoid illegal work.


Author(s):  
Misako Nagasaka ◽  
Nagaratna Sarvadevabatla ◽  
Shawn Iwata ◽  
Yubin Ge ◽  
Ammar Sukari ◽  
...  
Keyword(s):  

2012 ◽  
Author(s):  
James A. DeBardelaben ◽  
Jeremy K. Miller ◽  
Wilbur L. Myrick ◽  
Joel B. Miller ◽  
G. Charmaine Gilbreath ◽  
...  

2021 ◽  
Vol 6 (1) ◽  
pp. 72-82
Author(s):  
Faiz Iman Djufri ◽  
Charles Lim

Cyber Security is an interchange between attackers and defenders, a non-static balancing force. The increasing trend of novel security threats and security incidents, which does not seem to be stopping, prompts the need to add another line of security defences. This is because the risk management and risk detection has become virtually impossible due to the limited access towards user data and the variations of modern threat taxonomies. The traditional strategy of self-discovery and signature detection which has a static nature is now obsolete in facing threats of the new generation with a dynamic nature; threats which are resilient, complex, and evasive. Therefore, this thesis discusses the use of MISP and The Triad Investigation approach to share the Indicator of Compromise on Cyber Intelligence Sharing Platform to be able to address the newt threats.


Sign in / Sign up

Export Citation Format

Share Document