The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the emerging of digital right managements, digital libraries and fast development of multimedia, data hiding techniques are popularly utilized to hide annotations or confidential information in multimedia. In this paper, a novel data hiding mechanism based on the application of Rubik's cubic algorithm is proposed. The rationale of adopting Rubik's cubic is due to it possesses 6 faces and can...
Recently, according to the emerging development of smart mobile phones and tablet PC, mobile e-commerce has dramatically increased due to the reason that the function of smart mobile phone and tablet PC are combined together. M-banking is thus become more convenient, effective and timely through the new mobile communication systems. In order to raise the security of M-banking, some banks adopt the...
The study aims to provide an ease-of-use approach for senior patients to utilize remote healthcare systems. An ease-of-use remote healthcare system (RHS) architecture using RFID (Radio Frequency Identification) and networking technologies is developed. Specifically, the codes in RFID tags are used for authenticating the patients’ ID to secure and ease the login process. The patient needs only to take...
Numerous accidents from crowd stampedes have been recorded in human history, Therefore, the public has set high priority on the safety of public places. Surveillances systems aim to use artificial intelligence to address this problem, so that the crowd accident can be significantly reduced. We adopt a low cost camera to gather visual data and propose a cellular model for data interpretation. Based...
Decreasing traffic accidents and events are one of the most significant responsibilities for most of the government in the world. Nevertheless, it is hard to precisely predict the traffic condition. In order to understand the real cause of traffic accidents and restore the occurrence of traffic events, a traffic monitor and event analysis mechanism based on 3D video processing techniques is proposed...
Distributed denial of service (DDoS) is one of the most persecution network attack techniques to be confronted in recent years. From the definition of DDoS, thousands of network attacks must initiate simultaneously and continuously to achieve a successful DDoS attacking. Therefore, almost all of the information system cannot survive as they confront the DDoS attacks. Although there are a lot of intrusion...
In circuit simulation, Relaxation-based algorithms have been proven to be faster and more flexible than the standard direct approach used in SPICE. ITA (Iterated Timing Analysis) algorithm has even been widely used in industry. This paper describes accelerating techniques that enable ITA to utilize circuits' multi-rate behaviors. These techniques are based on the latency property of subcircuits and...
In circuit simulation, Relaxation-based algorithms have been proven to be faster and more flexible than the standard direct approach used in SPICE. ITA (Iterated Timing Analysis) algorithm has even been widely used in industry. This paper describes a new accelerating technique using the latency property of subcircuits and other accelerating methods based on Strength of Signal flow (SSF) for ITA algorithm...
Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired/wireless networking, providing sufficient assurance of information security such as confidentiality, authentication, non-repudiation, and integrity...
Along with the fast development of network technology, the media for information dissemination via network communication has diversified gradually. Videoconferencing, being able to conduct visual communication and data exchange simultaneously, is accepted by more and more enterprises and individuals nowadays. This study explores relevant factors affecting the attitude and intention of the videoconference...
In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are...
In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
The occurrence of accidents on the freeway/highway has a significant impact on normal traffic manipulations and the reasons that cause accidents are admitted primarily due to the introduction of traffic incidents. Hence, automatic traffic monitoring system gradually attracts the attention of researchers in the field of intelligent transportation system. In this paper, a vision-based approach for automatic...
Traffic issue does result in serious social and economic problems in most of the countries. Therefore, developing an automatic analysis system to help improve the traffic management is a must. In this paper, a novel traffic analysis mechanism based on multidimensional hidden Markov model and the homogeneity measurement of the vehicular route and mutual activity of vehicles is developed. In this model,...
The selective-tracing waveform relaxation (STWR) algorithm, which combines good properties of traditional relaxation-based algorithms including WR and ITA, has been discussed. STWR is basically a WR algorithm, but it selectively traces and schedules subcircuits for one individual calculation. STWR can exploit circuits' multi-rate behaviors, uses dynamical windows (controlled by the convergence situations)...
Sharing network bandwidth is significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprisepsilas confidential information. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting...
The traffic does result in serious social and economic problems in most of the countries. Therefore, developing automatic analysis system to help promote the traffic managing efficiency is a must. In the paper, an embedded analysis mechanism based on Fourier descriptor, motion vector, and homogeneity measurement is developed. Where the Fourier descriptor is utilized for vehicle tracing and the motion...
A vision-based traffic detection method at nighttime based on entropy measurement is proposed. Due to limited precision and complicate impact factors exist at night time, the impacted factors beams and reflected lighting should be firstly eliminated. After then, the vehicular tail/heading lighting will be the only underlying features to represent the detected vehicle. The exponential entropy of the...
In this study, a calibrated dual-camera device, a fixed camera and a pan-tilt-zoom camera, is setup to monitor moving vehicles in an open space. This device not only tracks multiple targets but also gets the license plate images with high quality. Next, a convolutional neural network (CNN) is designed to be a detector and a character classifier for efficiently locating the regions of license plates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.