Showing 201 - 220 results of 5,298 for search '"Tampere"', query time: 0.18s Refine Results
  1. 201

    Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm by Jonny Karlsson, Laurence S. Dooley, Göran Pulkkis

    Published 2013-05-01
    “…This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. …”
    Get full text
    Article
  2. 202

    The Role of DRT in European Urban Public Transport Systems—A Comparison between Tampere, Braunschweig and Genoa by Tiziano Pavanini, Heikki Liimatainen, Nina Sievers, Jan Peter Heemsoth

    Published 2023-05-01
    “…The purpose of this paper is to understand the role that on-demand transport plays in the strategic choices of public transport authorities (PTAs): to this end, this study examined the DRT services of three geographically distant European cities, in order to test different social, cultural and regulatory backgrounds, examining their main characteristics. Tampere, Braunschweig and Genoa were selected for the purposes of this work; data and information were collected by viewing the official websites of public transport companies and by direct contact via mail/telephone with the managers responsible for on-call transport. …”
    Get full text
    Article
  3. 203
  4. 204

    A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization by Syifak Izhar, Hisham, Liew, Siau-Chuin, Jasni, Mohamad Zain

    Published 2013
    “…Therefore, this paper also focuses on a specific application of digital image watermarking for medical images which is tamper localization.…”
    Get full text
    Get full text
    Article
  5. 205

    Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images by Hui, Liang Khor, Liew, Siau-Chuin, Jasni, Mohamad Zain

    Published 2017
    “…Tampering on medical image will lead to wrong diagnosis and treatment, which is life-threatening; therefore, digital watermarking on medical image was introduced to protect medical image from tampering. …”
    Get full text
    Get full text
    Article
  6. 206

    Region of interest-based tamper detection and lossless recovery watermarking scheme on MRI and X-ray medical images by Ooi, Jessie, Khor, Hui-Liang, Liew, Siau-Chuin

    Published 2020
    “…In this study, a ROI-based tamper detection and recovery watermarking scheme has been introduced. …”
    Get full text
    Conference or Workshop Item
  7. 207

    TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform by Amrullah, Agit, Ernawan, Ferda, Anis Farihan, Mat Raffei, Liew, Siau-Chuin

    Published 2025
    “…Image watermarking is one of techniques that can be used to protect and recover from the altered images. Tamper detection in semi-fragile still does not achieve high accuracy for tamper localization, especially in malicious attacks. …”
    Get full text
    Article
  8. 208
  9. 209

    PoWBWM: Proof of work consensus cryptographic blockchain-based adaptive watermarking system for tamper detection applications by P. Aberna, L. Agilandeeswari

    Published 2025-01-01
    “…Image tamper detection is a challenging area in multimedia research. …”
    Get full text
    Article
  10. 210

    TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform by Agit Amrullah, Ferda Ernawan, Anis Farihan Mat Raffei, Liew Siau Chuin

    Published 2025-01-01
    “…Image watermarking is one of techniques that can be used to protect and recover from the altered images. Tamper detection in semi-fragile still does not achieve high accuracy for tamper localization, especially in malicious attacks. …”
    Get full text
    Article
  11. 211
  12. 212
  13. 213
  14. 214

    A Small Tamper-Resistant Anti-Recycling IC Sensor With a Reused I/O Interface and DC Signalling by Alexandros Dimopoulos, Mihai Sima, Stephen W. Neville

    Published 2024-01-01
    “…This work proposes a novel real-world deployable on-chip sensor that: 1) is tamper-resistant by exploiting persistent changes caused by hot carrier injection (HCI); 2) generates a DC signal measurable by common low-cost test equipment; and 3) reuses an existing I/O interface, including existing pins; while 4) requiring a very small footprint. …”
    Get full text
    Article
  15. 215

    Cohort profile: The Vitality 90+ Study—a cohort study on health and living conditions of the oldest old in Tampere, Finland by Jani Raitanen, Marja Jylha, Linda Enroth, Pauliina Halonen, Kristina Tiainen

    Published 2023-02-01
    “…The study was designed to examine trends in health, functioning, living conditions, quality of life and care needs among the oldest old in Finland.Participants Nine mailed surveys have been conducted in the city of Tampere between 1995 and 2018. The first three surveys in 1995, 1996 and 1998 included all community-dwelling individuals aged 90 years or older; and the following six surveys in 2001, 2003, 2007, 2010, 2014 and 2018 covered all individuals in Tampere regardless of their living arrangements. …”
    Get full text
    Article
  16. 216
  17. 217

    Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic by Manasi Jana, Biswapati Jana, Subhankar Joardar

    Published 2022-11-01
    “…The aim of designing self-embedding fragile watermarking is copy-right protection, tamper localization and image recovery. This paper proposes a self-embedding fragile watermarking scheme for tamper detection and recovery based on local image characteristics using Absolute Moment Block Truncation Coding (AMBTC) and fuzzy logic. …”
    Get full text
    Article
  18. 218
  19. 219
  20. 220

    AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem by Afrig, Aminuddin, Ernawan, Ferda

    Published 2023
    “…This paper proposes a new block mapping technique for image authentication and self-recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper coincidence problem can arise when modifications to an image affect the original block and its recovery data, resulting in the inability to recover the tampered region of the image. …”
    Get full text
    Article