Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Digital techniques.

Zeitschriftenartikel zum Thema „Digital techniques“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Digital techniques" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Indra R Yoganapriya, P. „Pre-Processing Techniques for Digital Mammograms“. International Journal of Science and Research (IJSR) 12, Nr. 2 (05.02.2023): 647–51. http://dx.doi.org/10.21275/sr23206162028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Chahal, Prabhjot Kaur, Amritpal Singh und Palwinder Singh. „Digital Watermarking Techniques“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, Nr. 8 (27.11.2013): 2903–9. http://dx.doi.org/10.24297/ijct.v11i8.3009.

Der volle Inhalt der Quelle
Annotation:
More the development of the multimedia, more the digitalization, the more is the access to internet. This fast rate of enhancement gives a sense of protection and authentication. Digital watermarking technology provides a strong solution to insecurity created by digitalization. In this paper, our focus is on the basic concepts of watermarking, their characterisation, their techniques. Extending more, we will elaborate one of the latest technique of watermarking named as “Discrete Cosine Transform” (DCT).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Rajagopalan, S. K. „Digital Transmission Techniques“. IETE Journal of Education 33, Nr. 1 (Januar 1992): 3–11. http://dx.doi.org/10.1080/09747338.1992.11436349.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Challener, P. „Digital logic techniques“. Microprocessors and Microsystems 9, Nr. 1 (Januar 1985): 34–35. http://dx.doi.org/10.1016/0141-9331(85)90222-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Babatunde, R. S. „A Techniques for Face Recognition Systems“. Advances in Multidisciplinary & Scientific Research Journal Publications 5, Nr. 1 (30.03.2017): 95–108. http://dx.doi.org/10.22624/aims/digital/v5n1p20x.

Der volle Inhalt der Quelle
Annotation:
In this research, a comparison of the various techniques used for face recognition is shown in tabular format to give a precise overview of what different authors have already projected in this particular field. A systematic review of 40 journal articles pertaining to feature dimensionality reduction was carried out. The articles were reviewed to appraise the methodology and to identify the key parameters that were used for testing and evaluation. The dates of publication of the articles were between 2007 and 2015. Ten percent (10%) of the articles reported the training time for their system while twenty four percent (24%) reported their testing time. Sixty seven percent (67%) of the reviewed articles reported the image dimension used in the research. Also, only fourty eight percent (48%) of the reviewed articles compared their result with other existing methods. The main emphasis of this survey is to identify the major trade-offs of parameters and (or) metrics for evaluating the performance of the techniques employed in dimensionality reduction by existing face recognition systems. Findings from the review carried out showed that major performance metrics reported by vast amount of researchers in this review is recognition accuracy in which eighty six percent (86%) of the authors reported in their experiment. Keywords: Optimal Subset, High Dimension, Face Recognition, Biometrics, Feature Vector
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kumar Saini, Mukesh, Arun Saini und Sachin Gupta. „Digital Image Processing Techniques for Leukemia Detection“. International Journal of Science and Research (IJSR) 13, Nr. 6 (05.06.2024): 1710–19. http://dx.doi.org/10.21275/sr24627090927.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Vatsenko, A. „Digital Forensics Techniques Overview“. Bulletin of Science and Practice 6, Nr. 6 (15.06.2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.

Der volle Inhalt der Quelle
Annotation:
This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Dube, Avinash. „DIGITAL TECHNIQUES AND ART“. International Journal of Research -GRANTHAALAYAH 7, Nr. 11 (30.11.2019): 89–91. http://dx.doi.org/10.29121/granthaalayah.v7.i11.2019.3706.

Der volle Inhalt der Quelle
Annotation:
Modern age is a digital age. Digitalization is improving the things in all sectors. In electronics digital instruments are replacing conventional analog instruments giving precession and accuracy. Teaching learning methods are greatly improved due to incorporation of digital technology. Life style of common people is also changing due to digital tranjections, online shopping, online banking etc. The field of art and painting is also influenced by digital techniques available now a day. With emergence of new tools and techniques the art of painting is gaining new shapes. Digital technical skills provide a wide platform for imagination of artists. There are pros and cons of each aspects but it is true that art always connect students with their own culture as well as with the wider world. Visual art always improve learners critical thinking.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Jaiswal, Abhilasha. „DIGITAL TECHNIQUES OF PAINTING“. International Journal of Research -GRANTHAALAYAH 7, Nr. 11 (30.11.2019): 150–53. http://dx.doi.org/10.29121/granthaalayah.v7.i11.2019.3727.

Der volle Inhalt der Quelle
Annotation:
As technology is evolving gradually from the ages, the human way of living and different types of arts have also influenced. In these days the old energy consuming process has got extent and a creative fusion of the two worlds of art and technology is prevailing. Inspiringly, the background medium of this force which is fast developing into an indispensable asset is the digital age of computer. It’s effect on the human life can be said to have secured unusual style in past 20th century, where the computer as a machine which uses codes and binary digits computerized to keep and achieve facts provided, were used in various ways to process easier the functions of particular absolutely necessary machines in human attempts to achieve a goal, until then it was done manually or by some other means.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Abdul Majeed Haleem, Alyaa, und Nadia Mohammed. „Digital Information Hiding Techniques“. AL-Rafidain Journal of Computer Sciences and Mathematics 7, Nr. 3 (30.12.2010): 109–20. http://dx.doi.org/10.33899/csmj.2010.163916.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

NAKAMURA, YUTAKA. „RADIONUCLIDE DIGITAL IMAGING TECHNIQUES“. Japanese Journal of Radiological Technology 45, Nr. 11 (1989): 1780–84. http://dx.doi.org/10.6009/jjrt.kj00001359090.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Sundareshan, B. „Digital Modulation—Baseband Techniques“. IETE Journal of Education 33, Nr. 1 (Januar 1992): 35–44. http://dx.doi.org/10.1080/09747338.1992.11436355.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Bhatnagar, R. C., und B. Sundareshan. „Digital Modulation—Bandpass Techniques“. IETE Journal of Education 33, Nr. 1 (Januar 1992): 45–56. http://dx.doi.org/10.1080/09747338.1992.11436356.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Monaghan, Mark J. „Digital techniques in echocardiography“. International Journal of Cardiology 22, Nr. 2 (Februar 1989): 275–76. http://dx.doi.org/10.1016/0167-5273(89)90082-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

., Gomathi K. V. „DIGITAL IMAGE COMPRESSION TECHNIQUES“. International Journal of Research in Engineering and Technology 03, Nr. 10 (25.10.2014): 285–90. http://dx.doi.org/10.15623/ijret.2014.0310044.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Vaman, D. R., C. V. Chakravarthy und Ioannis S. Dedes. „Digital Speech Interpolation Techniques“. IETE Journal of Research 36, Nr. 5-6 (September 1990): 337–44. http://dx.doi.org/10.1080/03772063.1990.11436904.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Zou, W. Y. „Digital HDTV compression techniques“. IEEE Transactions on Broadcasting 37, Nr. 4 (1991): 131–33. http://dx.doi.org/10.1109/11.106198.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

McNeil, A. J. S., und P. J. Mitchell. „Digital techniques in electrochemistry“. Surface Technology 25, Nr. 3 (Juli 1985): 195–215. http://dx.doi.org/10.1016/0376-4583(85)90136-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Adedibu, O., und M. E. Adeshipo. „A Review of Anomaly Detection Techniques for Intrusion Detection“. Advances in Multidisciplinary & Scientific Research Journal Publication 6, Nr. 4 (31.12.2018): 1–10. http://dx.doi.org/10.22624/aims/digital/v6n4p1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Zhang, J. F. „VLSI Testing: Digital and Mixed Analogue/Digital Techniques“. Measurement Science and Technology 10, Nr. 12 (01.12.1999): 1357. http://dx.doi.org/10.1088/0957-0233/10/12/502.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Dan, Man Kan, und Dr T. Meyappan. „WATERMARKING TECHNIQUES“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, Nr. 3 (30.06.2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.

Der volle Inhalt der Quelle
Annotation:
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Joshua, Wemegah. „A Review of Various Data Security Techniques in Wireless Communication Systems“. Advances in Multidisciplinary and scientific Research Journal Publication 10 (30.11.2022): 15–24. http://dx.doi.org/10.22624/aims/digital/v10n4p3.

Der volle Inhalt der Quelle
Annotation:
Sensitive data is constantly being transmitted particularly over wireless communication systems due to how convenient this wireless communication systems are. However, these communication systems are generally weak in terms of privacy protection and security as a whole. This is because anyone within the perimeter of a wireless network can attempt hacking into the network without physically connecting to it. This paper will focus on the two most common data security techniques in wireless communication systems – steganography and cryptography. Steganography is the practice of hiding information in another message or physical item such that its presence cannot be detected by human examination. Cryptography on the other hand is the science of encrypting information in a way that unintended recipients cannot interpret and then decrypting the said message back into plaintext. Keywords: Cryptography, Data Encryption, Data Decryption, Steganography, Wireless Communication
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Anosike, Joseph Ugonna, und Uchenna Petronilla Ogoke. „A Comparative Analysis on the Model Adequacy of Four Transformation Techniques“. Advances in Multidisciplinary and scientific Research Journal Publication 10, Nr. 3 (30.09.2022): 137–47. http://dx.doi.org/10.22624/aims/digital/v10n1p10x.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT This study compared four different transformation techniques by applying a simple linear regression on raw and transformed data. The R2 of each model was obtained and a test on the significance of these R2 was carried out. Also, the rxy(coefficient of correlation) were also obtained. The data used is a secondary data consisting of 53years (1964-2016) of the infant mortality rate in Nigeria (https://www.ceicdata.com/en/nigeria/health-statistics/ng-mortality-rate-infant-per-1000-live-births). The rxy were also compared and the results, 95.8%, 95.8%, 96.2%, 93.0%, and 92.9% respectively. The R2 obtained for the raw data, logarithm, square-root, square and inverse are as follows: 91.8%, 91.7%, 92.5%, 86.6% and 86.4% respectively. However, the R2 obtained for the raw data, logarithm, square-root, square and inverse compete favourably but the performance of inverse transformation suits the data most in terms of model accuracy. Key Words: Transformation, Raw data, logarithm, square-root, square, inverse
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ugonna, Anosike Joseph, und Uchenna Petronilla Ogoke. „A Comparative Analysis on the Model Adequacy of Four Transformation Techniques“. Advances in Multidisciplinary and scientific Research Journal Publication 10 (30.09.2022): 137–47. http://dx.doi.org/10.22624/aims/digital/v10n1p9.

Der volle Inhalt der Quelle
Annotation:
This study compared four different transformation techniques by applying a simple linear regression on raw and transformed data. The R2 of each model was obtained and a test on the significance of these R2 was carried out. Also, the rxy(coefficient of correlation) were also obtained. The data used is a secondary data consisting of 53years (1964-2016) of the infant mortality rate in Nigeria (https://www.ceicdata.com/en/nigeria/health-statistics/ng-mortality-rate-infant-per-1000-live-births). The rxy were also compared and the results, 95.8%, 95.8%, 96.2%, 93.0%, and 92.9% respectively. The R2 obtained for the raw data, logarithm, square-root, square and inverse are as follows: 91.8%, 91.7%, 92.5%, 86.6% and 86.4% respectively. However, the R2 obtained for the raw data, logarithm, square-root, square and inverse compete favourably but the performance of inverse transformation suits the data most in terms of model accuracy. Key Words: Transformation, Raw data, logarithm, square-root, square, inverse A Comparative Analysis on the Model Adequacy of Four Transformation Techniques
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Vijaya, C. „Digital Modulation & Detection Techniques Using FRFT Basis Functions“. Bonfring International Journal of Research in Communication Engineering 6, Special Issue (30.11.2016): 44–47. http://dx.doi.org/10.9756/bijrce.8198.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Kulkarni, Pooja, Shraddha Bhise und Sadhana Khot. „Review of Digital Watermarking Techniques“. International Journal of Computer Applications 109, Nr. 16 (16.01.2015): 40–44. http://dx.doi.org/10.5120/19275-1029.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Karavasilev, Tony. „Securing Sensitive Digital Data Techniques“. IOSR Journal of Computer Engineering 19, Nr. 03 (Juni 2017): 53–66. http://dx.doi.org/10.9790/0661-1903055366.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Will, Rachel L. „Digital Techniques in Historic Preservation“. Technology|Architecture + Design 6, Nr. 1 (02.01.2022): 15–20. http://dx.doi.org/10.1080/24751448.2022.2040298.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Gohokar, V. V. „Simulation of Digital Modulation Techniques“. IETE Journal of Education 53, Nr. 1 (Januar 2012): 5–8. http://dx.doi.org/10.1080/09747338.2012.10876089.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Bobinsky, E. „Digital modulation techniques [Book Review]“. IEEE Communications Magazine 39, Nr. 6 (Juni 2001): 24–28. http://dx.doi.org/10.1109/mcom.2001.925668.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Shukla, Deepti, und Nirupama Tiwari. „Survey on Digital Watermarking Techniques“. International Journal of Signal Processing, Image Processing and Pattern Recognition 8, Nr. 9 (30.09.2015): 121–26. http://dx.doi.org/10.14257/ijsip.2015.8.9.12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Shukla, Deepti, Nirupama Tiwari und Deepika Dubey. „Surevey on Digital Watermarking Techniques“. International Journal of Signal Processing, Image Processing and Pattern Recognition 9, Nr. 1 (31.01.2016): 239–44. http://dx.doi.org/10.14257/ijsip.2016.9.1.23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Thompson, David L. „An Introduction to Digital Techniques“. Electronic Systems News 1986, Nr. 3 (1986): 34. http://dx.doi.org/10.1049/esn.1986.0083.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Hartmann, H., und E. Steiner. „Synchronization Techniques for Digital Networks“. IEEE Journal on Selected Areas in Communications 4, Nr. 4 (Juli 1986): 506–13. http://dx.doi.org/10.1109/jsac.1986.1146360.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Rossing, Thomas D. „Digital techniques for sound recording“. Physics Teacher 32, Nr. 8 (November 1994): 458–64. http://dx.doi.org/10.1119/1.2344080.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Gammon, LM. „Macro Techniques and Digital-Microscopy“. Microscopy and Microanalysis 12, S02 (31.07.2006): 1682–83. http://dx.doi.org/10.1017/s1431927606061332.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Hurst, S. L., D. M. Miller und J. C. Muzio. „Spectral techniques in digital logic“. Signal Processing 9, Nr. 2 (September 1985): 138. http://dx.doi.org/10.1016/0165-1684(85)90052-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Moon, Jared L., Carl A. Kihm, Daniel A. Perez, Leslie B. Dowling und David C. Alder. „Digital Arthrodesis: Current Fixation Techniques“. Clinics in Podiatric Medicine and Surgery 28, Nr. 4 (Oktober 2011): 769–83. http://dx.doi.org/10.1016/j.cpm.2011.07.003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

D’Angelantonio, Albert M., Kaitlin A. Nelson-Rinaldi, Jade Barnard und Frank Oware. „Master Techniques in Digital Arthrodesis“. Clinics in Podiatric Medicine and Surgery 29, Nr. 1 (Januar 2012): 21–40. http://dx.doi.org/10.1016/j.cpm.2011.10.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Alina, Ziv, und Ofer Amrani. „On Digital Post-Distortion Techniques“. IEEE Transactions on Signal Processing 64, Nr. 3 (Februar 2016): 603–14. http://dx.doi.org/10.1109/tsp.2015.2477806.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Kim, Myung K., Lingfeng Yu und Christopher J. Mann. „Interference techniques in digital holography“. Journal of Optics A: Pure and Applied Optics 8, Nr. 7 (08.06.2006): S518—S523. http://dx.doi.org/10.1088/1464-4258/8/7/s33.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Stone, Jenny L., Robert L. Peterson und John E. Wolf. „Digital imaging techniques in dermatology“. Journal of the American Academy of Dermatology 23, Nr. 5 (November 1990): 913–17. http://dx.doi.org/10.1016/0190-9622(90)70314-8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Kawai, Naoki. „Fundamental Techniques for Digital TV Broadcasting; (11). Multiplex and Transmission Techniques for Digital Broadcasting.“ Journal of the Institute of Television Engineers of Japan 48, Nr. 11 (1994): 1447–53. http://dx.doi.org/10.3169/itej1978.48.1447.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Babatunde, R. S. „A Systematic Review of Feature Dimensionality Reduction Techniques for Face Recognition Systems“. Advances in Multidisciplinary & Scientific Research Journal Publications 5, Nr. 1 (30.03.2017): 95–108. http://dx.doi.org/10.22624/aims/digital/v5n1p20.

Der volle Inhalt der Quelle
Annotation:
In this research, a comparison of the various techniques used for face recognition is shown in tabular format to give a precise overview of what different authors have already projected in this particular field. A systematic review of 40 journal articles pertaining to feature dimensionality reduction was carried out. The articles were reviewed to appraise the methodology and to identify the key parameters that were used for testing and evaluation. The dates of publication of the articles were between 2007 and 2015. Ten percent (10%) of the articles reported the training time for their system while twenty four percent (24%) reported their testing time. Sixty seven percent (67%) of the reviewed articles reported the image dimension used in the research. Also, only fourty eight percent (48%) of the reviewed articles compared their result with other existing methods. The main emphasis of this survey is to identify the major trade-offs of parameters and (or) metrics for evaluating the performance of the techniques employed in dimensionality reduction by existing face recognition systems. Findings from the review carried out showed that major performance metrics reported by vast amount of researchers in this review is recognition accuracy in which eighty six percent (86%) of the authors reported in their experiment. Keywords: Optimal Subset, High Dimension, Face Recognition, Biometrics, Feature Vector
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Li, Yue. „A Survey of Digital Forensic Techniques for Digital Libraries“. International Journal of Digital Library Systems 2, Nr. 3 (2011): 49–66. http://dx.doi.org/10.4018/jdls.2011070106.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Van Roekel, James L. „Digital creativity: Techniques for digital media and the Internet“. Journal of the American Society for Information Science and Technology 54, Nr. 4 (2003): 357–58. http://dx.doi.org/10.1002/asi.10205.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Khairunnisak, Khairunnisak, und Wahyu Widodo. „Digital Forensic Tools And Techniques For Handling Digital Evidence“. Jurnal RESISTOR (Rekayasa Sistem Komputer) 6, Nr. 1 (30.04.2023): 1–11. http://dx.doi.org/10.31598/jurnalresistor.v6i1.1266.

Der volle Inhalt der Quelle
Annotation:
The development of information security issues in many sectors makes the skill of mastering digital forensic highly needed. Digital forensic is recently used not only to support legal proceedings but also to investigate many incidents like digital data manipulation, site hacking, and terrorism. In mastering the skill of digital forensic, investigators should have knowledge about the techniques and tools that will be used. This research is proposed to help investigators in enhancing and developing their skills in revealing the content of digital evidence with the result reviews from each area in the forensic field. The review in this study is based on the focus of the forensic area by giving detailed information about the functions, limitations, and advantages as well as the specific techniques of forensics that leads to the techniques of live forensic or static forensic. This research also discusses the non-technical things that affect the performance of forensic investigation including operational activities, investigated activities, and legal elements. Thus, the result of this research is expected to be beneficial for helping investigators in determining the appropriate tools to investigate the digital evidence. The further research can develop the activities of anti-forensics that can hinder the investigation processes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Rhisheekesan, Abhishek, Dennis Thomas, Vaishnav Raj K, Gadha T, Pradeep A. V, Jijo Pulickiyil Ulahannan und Sajeev Damodarakurup. „Review on digital holography techniques using digital micromirror device“. Optics and Lasers in Engineering 177 (Juni 2024): 108120. http://dx.doi.org/10.1016/j.optlaseng.2024.108120.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Jimoh, Hammed O., und Mubarak O. Ahmed. „Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques“. Advances in Multidisciplinary & Scientific Research Journal Publications 12, Nr. 2 (Mai 2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.

Der volle Inhalt der Quelle
Annotation:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS attacks has gain lot of popularity since 2014, and this is as a result of the realization of high amplification scale that NTP servers can provide. This type of reflector attack maximized the use of the amplification factor of NTP servers to magnify the attack bandwidth, making it particularly disruptive and difficult to mitigate. Since NTP amplification is not a popularly known attack and there has not been much thorough research on it, this paper explores a holistic overview of NTP amplification attacks, how NTP is used for DDoS attacks, and the overall method that can be used to mitigate such attacks. Keywords: Distributed Denial-of-Service (DDoS) attack, DNS servers, NTP servers
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Jimoh, Hammed O., und Mubarak O. Ahmed. „Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques“. Advances in Multidisciplinary & Scientific Research Journal Publications 12, Nr. 2 (Mai 2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.

Der volle Inhalt der Quelle
Annotation:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS attacks has gain lot of popularity since 2014, and this is as a result of the realization of high amplification scale that NTP servers can provide. This type of reflector attack maximized the use of the amplification factor of NTP servers to magnify the attack bandwidth, making it particularly disruptive and difficult to mitigate. Since NTP amplification is not a popularly known attack and there has not been much thorough research on it, this paper explores a holistic overview of NTP amplification attacks, how NTP is used for DDoS attacks, and the overall method that can be used to mitigate such attacks. Keywords: Distributed Denial-of-Service (DDoS) attack, DNS servers, NTP servers
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie