Search Results - spatial information does information framework*
Search alternatives:
- information framework »
- spatial information »
- information does »
- does information »
-
1
Testing the minimal bounded space method on vision-based drone navigation / Yap Seng Kuang
Published 2021“…There is no imaging involved, but the laser sensor does record depth information. The spatial openings are derived by analyzing occlusion information from the environment, which is available from the depth information. …”
Get full text
Get full text
Get full text
Thesis -
2
GIS-MRA Techniques in Property Valuation: A Framework for Implementation
Published 1999“…GIS fills in this gap. With a proper framework, both GIS and MRA can be combined as a new tool of spatial reasoning in real estate analyses, particularly valuation. …”
Get full text
Get full text
Article -
3
Multimodality registration of two-dimensional echocardiography and cardiac CT for mitral valve diagnosis and surgical planning
Published 2024journal::journal article -
4
Multimodality registration of two-dimensional echocardiography and cardiac CT for mitral valve diagnosis and surgical planning
Published 2024“…The proposed registration framework does not require optical tracking information. …”
Article -
5
Development of a registration framework for echocardiography and computed tomography cardiovascular image fusion / Azira Khalil
Published 2018“…This registration framework however does not utilize the optical tracking information. …”
Get full text
Get full text
Get full text
Thesis -
6
Integrating GIS and AHP for land suitability analysis for urban development in a secondary city of Bangladesh
Published 2006“…GIS (Geographic Information System) has been recognized as a useful decision support technology, but it does not provide means to deal with multiple decision factors. …”
Get full text
Get full text
Get full text
Article -
7
A Framework to Spatially Cluster Air Quality Monitoring Stations in Peninsular Malaysia using the Hybrid Clustering Method
Published 2023“…The Department of Environment, Malaysia (DOE), provided the data set, which covered the two-year period from 2018 to 2019. …”
Get full text
Get full text
Get full text
Article -
8
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The framework consists of two stages: the preprocessing stage and the stream clustering stage. …”
Get full text
Get full text
Thesis -
11
