The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In orthopedic surgery, a semi constraint hinged prosthesis is inserted between the metacarpal and the first phalanx of the index finger. The purpose of the Implants development to allow maximum joint flexibility, and reduce joint pain effectively. In this paper; first the review of all the related areas is carried and after that with help of an implant study on loading conditions, deformation and...
Today, with the fast development of Extensible Markup Language (XML) and increasing amount of data that is published in the form of XML, copyright protection of these data is becoming an important requirement for numerous applications. This study is proposing a system that uses fingerprinting to trace illegal copies and detect any modification made to an XML data. However, the flexible construction...
Recently, much interest is being taken to protect the copyright of digital data and prevent illegal duplication of it. Towards this purpose, this paper proposes an imperceptible blind watermarking framework suitable for proving ownership claims for large 3D meshes. The basic idea is to decompose the original mesh into a series of details at different scales by using irregular lifting-based wavelet...
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software. This paper examines the use of opaque predicates as one of the building blocks of obfuscating transformations that conceal the control flow of...
Information monitoring is a very essential activity for management, control and decision making in various applications. This paper proposes an intelligent system for monitoring information sources that consists of many adaptive agents cooperate with each other in order to monitor every information item updates at the right time without over loading of system resources. The main key of the presented...
Different techniques are normally used for assembling insert-holders of metal cutting tools. For instance, mechanical clamping, brazing and adhesive bonding are common techniques for assembling metal cutting tools insert-holders. The present work addresses the impact of the assembly technique on the dimensional accuracy and geometrical tolerances of machined workpieces.Extensive cutting tests conducted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.