Results 261 to 270 of about 463,649 (305)
Some of the next articles are maybe not open access.

Enabling globally unique sensor ID with dual-interface RF tag

2011 IEEE SENSORS Proceedings, 2011
In any sensor information system, unique identification (ID) of each sensor is indispensable. Usual practices to secure uniqueness of sensor ID is to use MAC or network address or to use a proprietary ID in application layer. In pervasive computing era, it is desirable to uniquely identify a sensor with a URN regardless of types of network to which the
Jin Mitsugi   +5 more
openaire   +1 more source

Fingerprint's core point based unique ID generation for security document

2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015
Security documents like certificates, land revenue documents, etc., have only the individual's name, address, and in some cases a photo as means of personal identification. This makes criminal impersonation an easy task. This paper proposes a method for creating a unique ID based on the core point of the fingerprint of an individual.
Sajan Ambadiyil   +2 more
openaire   +1 more source

Empowering India through unique IDs to 1.2 billion indians

Journal of Biometrics & Biostatistics, 2013
E an ID is a common challenge for poor. A resident typically accesses multiple service providers, at different times and needs to repeatedly re-establish his ID which is a problem for the poor. The Government of India has launched a project in 2009, under which an Aadhaar, (which means “ foundation”) , a unique 12 digit number, is issued to residents ...
openaire   +1 more source

Self-Organized Scheme for Unique Cell ID Assignment during Femtocell Deployment

2019 53rd Asilomar Conference on Signals, Systems, and Computers, 2019
Femtocell deployment has been a focus of wide research due to its potential to increase system capacity. There still are open challenges for the planning and management of femtocells caused by the potential interference issues that may arise when installing them under the coverage of larger cells (i.e., macrocells).
Khwandah, Sinan A.   +4 more
openaire   +3 more sources

ProMusicDB ID: Beyond a Unique Identifier for Professional Music

Music Reference Services Quarterly, 2015
Music is increasingly being produced, published, distributed, discovered, and consumed online. Various aspects of professional music and related activities are featured on online portals with holdi...
openaire   +1 more source

IoT-ID: A Novel Device-Specific Identifier Based on Unique Hardware Fingerprints

2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), 2020
A significant number of IoT devices are being deployed in the wild, mostly in remote locations and in untrusted conditions. This could include monitoring an electronic perimeter fence or a critical infrastructure such as telecom and power grids. Such applications rely on the fidelity of data reported from the IoT devices, and hence it is imperative to ...
Girish Vaidya   +4 more
openaire   +1 more source

Adaptive Generation of Unique IDs for Digital Chips through Analog Excitation

ACM Transactions on Design Automation of Electronic Systems, 2015
Globalization of the integrated circuit design and manufacturing flow has successfully ameliorated design complexity and fabrication cost challenges, and helped deliver cost-effective products while meeting stringent time-to-market requirements. On the flip side, it has resulted in various forms of security vulnerabilities in the supply chain that ...
Chandra K. H. Suresh   +2 more
openaire   +1 more source

ASCIi based cryptography using unique id, matrix multiplication and palindrome number

The 2014 International Symposium on Networks, Computers and Communications, 2014
Encryption is most effective way to achieve data security. This is done by converting the data into cipher text. The existing way of doing this was using Armstrong number. Since there are few Armstrong numbers therefore a crypt-analyst can easily find the key.
J Gitanjali   +3 more
openaire   +1 more source

Performance of BFSA Collision Resolution: RFID Including Non-unique Tag IDs

2014
As RFID technology becomes ever more affordable, its large scale implementation has been a growing trend in recent years. While current protocols allow for non-unique tag IDs, most existing implementations largely optimize RFID system’s performance based on the assumption of unique tag IDs and treat the existence of non-unique tag IDs within reader’s ...
Chemburka, Kirti   +3 more
openaire   +2 more sources

Unique-ID based channel hopping rendezvous algorithm for cognitive radio ad hoc networks

2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017
Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness
Aishwarya Sagar Anand Ukey, Meenu Chawla
openaire   +1 more source

Home - About - Disclaimer - Privacy