The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article summarizes the actual results of our research in designing new group of polymorphous modes of operation for block ciphers. We have designed general scheme of block cipher polymorphous mode of operation based on pseudorandom number generator (PRNG) and function F. We have also designed the first polymorphous mode based on this scheme PM-DC-LM using the chaotic pseudo-random number generator...
Google's Dataset Publishing Language (DPSL) and Google's Public Data Explorer (GPDE) offer Institutions of Higher Education (IHE) powerful ways to analyze campus-wide assessments of learning outcomes that were formerly unavailable to staff, assessment coordinators, institutional researchers, and other stake holders. Current practices in institutional assessment are severely limited, but DPSL and GPDE...
This paper outlines preliminary steps towards the development of an audio-based room-occupancy analysis model. Our approach borrows from speech recognition tradition and is based on Gaussian Mixtures and Hidden Markov Models. We analyse possible challenges encountered in the development of such a model, and offer several solutions including feature design and prediction strategies. We provide results...
This paper captures the design of a crossover Augmented Reality (AR) gamified learning experience called GreenDesigners focused on sustainable engineering education for high school students. Located at a solar demonstration house, our design leverages the functionality of an Augmented Reality interface developed to coordinate learning of sustainable engineering design concepts and practices across...
Multi-agent based systems have been used in a number of practical application domains. However their use in computer vision based systems that often provide solutions to automated video surveillance, remains in its infancy. Addressing this gap in research this paper proposes a novel design, based on multi-agents, to address one of the most important open research problems in video surveillance, i...
A supervised facial recognition system is proposed in this paper. There are three main phases in the proposed system, namely, Preprocessing, Feature Extraction, and Classification. Cropping, choosing appropriate dimensions, and prefiltering are performed in the first phase. In the feature extraction phase, Two Dimensional Discrete Multiwavelet Transform (2D DMWT) is applied to the facial images to...
The article is an extension of this paper1. It describes methods for dealing with reliability and fault tolerance issues in cloud-based datacenters. These methods mainly focus on the elimination of a single point of failure within any component of the cloud infrastructure, availability of infrastructure and accessibility of cloud services. Methods for providing the availability of hardware, software...
This paper describes the use of optimal control theory applied to the motion of a low-power laser beam to precisely move a droplet in a liquid layer by means of the force on the liquid-liquid interface arising due to the surrounding thermal field (thermocapillary force and Marangoni effect). The form of heat field equations is approximated by the solution of a finite sum of laser pulses, whose analytical...
The key advantages of the 5G network include among other things a 1000x capacity increase in the available network capacity. This increase will support the Internet of things and also the Device to Device communication architecture. However, the increased network capacity provided by the 5G communications standards comes with the high cost of infrastructure. The high attenuation faced by mmWaves in...
Adoption of millions of small energy efficient, low power digital and DC appliances at home and at work is resulting in a significant and fast growing fraction of a building's electricity actually consumed in low voltage DC form. Building integrated energy systems featuring renewable photovoltaics are also increasingly attractive as part of an overall electricity and emissions reduction strategy....
The development of Web applications has a crucial role as most organizations have their own corporate Web applications to meet the needs of their respective businesses. Different needs create different complexities which represent a new challenge to Web application development. In order to ensure the timely delivery of a project, software providers offering this service choose to use Open Sources...
This study reviews expediency and influences of extensible Business Reporting Standard in terms of Financial and Business Reporting Value Chain by implying flow of financial information from business operations to internal and external reporting to end user groups of financial reports. Further, identifies influences, the International Accounting Standard Board (IABS) had on extensible Business Reporting...
The persistent rapid and vast growth of Internet's population, considering number of users, servers, links, and many new applications, has led to exponential network traffic increase, stimulating the increased demand for greater capacity of the communication network. While the fiber optic links are capable to achieve multi-gigabit bandwidth, the router's network processing hardware still remains the...
The healthcare system consists of large volumes of data which are usually generated from diverse sources such as physicians' case notes, hospital admission notes, discharge summaries, pharmacies, insurance companies, medical imaging, laboratories, sensor based devices, genomics, social media as well as articles in medical journals. Healthcare data are however very complex and difficult to manage....
Wireless Sensor Networks (WSNs) consist of multiple sensors distributed in a certain geographic area. The goal of using WSNs is to monitor certain phenomena such as; environmental or physical. The nodes in WSNs transmit data through a wireless network that lacks infrastructure, which makes those networks exposed to security threats. One of those security threats is the black-hole attack which can...
One of the most effective Cyber-attacks against legitimate targets is Denial of Service (Dos). Despite the fact that security improvements in IPv6 are notable, meanwhile “black hat” experts launch their continuous threats against business network and banking systems to damage the network service development. In order to mitigate such security threat, we need to understand the infrastructure and the...
This work presents necessary conditions to implement numerically and experimentally the discrete version-obtained by using Euler discretization-of the generalized Chua's circuit generator of multi-scroll chaotic attractors. In addition, one degradation analysis for the chaotic dynamics-from the calculation of Lyapunov exponents of discretized version-with respect to the continuous model is reported...
As IT technology advances, the number of people who use electronic financial transaction recently increases. However, as the number of users and the amount of transaction increase, the cyber-attacks and security incidents also increase. To cope with these incident responses, applying digital forensic technology is essential for financial network. In this paper, we analyze main financial cyber security...
As secure processing as well as correct recovery of data getting more important, digital forensics gain more value each day. This paper investigates the digital forensics tools available on the market and analyzes each tool based on the database perspective. We present a survey of digital forensics tools that are either focused on data extraction from databases or assist in the process of database...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.