Malware :RFID
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 3
Abstract
This paper presents various approaches and analysis that describes the terminology for RFID malware. There are various approaches used for RFID malware analysis and still lot of work is going on in this direction. Our purpo this paper is to analyse the various basic terms and approaches that have been introduced in this particular domain
Authors and Affiliations
Ankur Singh Bist
A Survey on Improving Robustness of Image Watermarking By Using Gradient
Digital images can be captured easily with digital cameras, scanners and can be easily uploaded on the internet. Images can be appeared widely in the internet and can be copied from the internet. JPEG is one of th...
INVESTIGATION ON SHUNT ACTIVE POWER FILTER USING PI CONTROLLER
This paper describes the application of PI controller to a three phase shunt active power filter for power quality improvements and reactive power compensation required by a nonlinear load. Most active power filte...
EXPERIMENTAL AND NUMERICAL INVESTIGATION TO AVOID EXTERNAL CONDENSATION ON FLIPPER MULLION IN FRENCH DOOR REFRIGERATOR
In French-style doors a flipper mullion is provided to have an air tight seal to avoid heat leakage between the doors. It is attached to one of the French doors through both of the hinge members. However, due...
Developing a GUI based Design Software in VB Environment to Integrate with CREO for Design and Modeling using Case Study of Coupling
The Research Work is carried out on the approach of a CADD (Computer Aided Design and Drafting) and Concurrent engineering. Because with the use of this developed system all phase of product development Design, m...
Detection of Motion in Video Frame Extraction Process
This paper presents a technique for motion detection that incorporates several innovative mechanisms. For example, our proposed technique stores, for each pixel, a set of values taken in th neighborhood. It then compar...