"Data leakage detection using watermarking" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 4 of 50 - About 500 Essays
  • Powerful Essays

    Motion Detection

    • 697 Words
    • 3 Pages

    multiple objects. We present various algorithms for tracking objects and determining the velocity of moving object in sequence of frames. Using the segmentation technique we can locate a target in the current frame. Target localization in current frame was computationally much complex in the conventional algorithms. Searching an object in the current frame using these algorithms starts from its location of the previous frame in the basis of attraction probably the square of the target area‚ calculating

    Premium Algorithm Image processing

    • 697 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    An Earth Leakage Circuit Breaker (ELCB) (now referred to as residual current circuit breaker) is a safety device used in electrical installations with high earth impedance to prevent shock. History ELCBs were mainly used on TT earthing systems. Nowadays‚ ELCBs have been mostly replaced by residual-current devices (RCDs). However many ELCBs are still in use. Early ELCBs responded to sine wave fault currents‚ but not to rectified fault current. Over time‚ filtering against nuisance trips has also

    Premium Electricity distribution Circuit breaker Earth

    • 1421 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    HL7 eLearning Course Module 2: Data Exchange Standards Learning Objectives: 1. The reader should understand how HL7 messages are transmitted in real time application interfaces. 2. The reader should understand what are Lower Level Protocol (LLP) when discussing the transmission of the HL7 Messages. 1 HL7 eLearning Course Data Exchange Standards • Lower Layer Protocol (LLP) is the most common mechanism for sending unencrypted HL7 message over a local area network‚ such as those found in

    Premium Internet Protocol Suite Transmission Control Protocol Internet

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Using ArrayList<ITSystem>‚ Reading and writing Data to/from Files Note: slight changes were made on 11/14 (1 day after this was put up).  Specifically‚ the source files are slightly different from the solution to p2.  When comparing two ITSystems we are now only concerned with ID.  Highlighted text reflects changes made to the assignment. For this assignment‚ we will continue to work with the SysInventory program we developed in the last programming project‚ with a few minor changes/additions. See

    Free File system Computer file

    • 1222 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    HW#3 Run regression analysis using the Energy Drinks Data posted on elearning. You can work by yourself‚ or work in a group (up to 5 students per group) and submit one homework per group. 1. (a) Run the linear regression model that express quantity sales (oz) of Full-Throttle as the dependent variable; the list of explanatory variables are price of Full-Throttle‚ the price of Monster‚ price of Red Bull‚ price of Rockstar and customer count. Submit the excel output. What is the R2 value? What

    Premium Regression analysis Linear regression Errors and residuals in statistics

    • 649 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Analyzing Data Using Pivot Tables – An Example Remember assignment 5 where you were asked to compare Invoice amounts to Sales Order amounts? You had to create a query to join together 2 tables from an Access database. If the results of that query had been downloaded into an Excel file (a simple thing to do)‚ you could have used the Excel file and a Pivot table to help in the analysis. Before you try to follow this example‚ you should learn as much as you can about Pivot Tables from Microsoft’s

    Premium Spreadsheet Microsoft Excel Microsoft Office

    • 288 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Fraud detection

    • 2073 Words
    • 24 Pages

    How the Fraudsters Fool the Auditors History of financial statement frauds acquisition accounting related party transactions non existent bank accounts - relationship with auditors overstated bank balance off balance sheet accounting misleading disclosures Changes occurring from Sarbanes Oxley Higher standards for corporate governance and accountability Creating an independent regulatory framework for the accounting profession Enhancing the quality and transparency of financial reports Developing

    Premium Auditing Audit External auditor

    • 2073 Words
    • 24 Pages
    Powerful Essays
  • Better Essays

    21‚ NO. 8‚ AUGUST 2011 Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Ersin Esen and A. Aydin Alatan‚ Member‚ IEEE Abstract—Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized

    Premium Error detection and correction Video Signal processing

    • 6460 Words
    • 26 Pages
    Better Essays
  • Powerful Essays

    | SPEED DETECTION USING DOPPLER EFFECT AND RADAR | | | INTRODUCTION Although there is good road safety performance the number of people killed and injured on our roads remain unacceptably high. So the roads safety strategy was published or introduced to support the new casualty reduction targets. The road safety strategy includes all forms of invention based on the engineering‚ education and enforcement and recognizes that there are many different factors that lead to traffic

    Premium Doppler effect Traffic law Wave

    • 2868 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Data storage using Nanotechnology and Electronics” Category: TECHNICAL Authors: A. Aparna and S. Krishna Prasad II year ECE‚ Gokaraju RangaRaju Institute of Engineering and Technology‚ Kukatpally‚ Hyderabad. Contact: Ph 09701540082- Krishna Prasad Email: aparnaalapati@yahoo.co.in krishnaprasad777@gmail.com Abstract: Electronics and nanotechnology working together would yield a holistic solution

    Premium Computer Computer security Sensor

    • 5235 Words
    • 21 Pages
    Powerful Essays
Page 1 2 3 4 5 6 7 8 9 50