Abstract The security of using applications in cloud services and on the Internet is an important topic in the field of engineering. In this paper, two laboratory tests for data transmission protection, specifically designed for different security analysis techniques, are presented and explained. During lab tests on public Wi-Fi networks from the MIDM (“Man in the Middle”) attacks, various monitoring techniques were applied, using a special lab test scenario with Kali Linux penetration tools by creating an SSH tunnel on an Android mobile device. These test benches allow easy data capturing, and the captured data is processed using available software programs. Expected outcomes, practical improvement and security performance assessment are presented in detail, and considered in terms of their value in security engineering. The aim of this paper is to detect and overcome some of the weaknesses of the application of security protocols in a Wi-Fi network environment.
Medical image registration plays an important part in most today’s clinical procedures. Registration goal is to find transformation which warps one image into the space of another. Registration of moving organs in human body has a significant part in therapy planning. This task is harder in cases when one organ (tissue) slides along another, i.e. in a case of discontinuities in the motion field. Discontinuities introduce unwanted transformations which often lead to poor or unsatisfied registration results. In this paper we evaluate one form of discontinuities for two well-known and used registration algorithms namely Free Form Deformation and Demons.
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više