The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Purely trigonal ilmenite type powder; CoTiO 3 was successfully synthesized through the thermal decomposition of CoC 2 O 4 ·2H 2 O–TiO 2 precursor. The decomposition course was followed using differential thermal analysis–thermogravimetry measurements and the intermediate decomposition products as well as the titanate product were characterized using X-ray diffraction,...
Most of the MAC protocols proposed for the wireless sensor networks (WSN) assume sensor nodes to be static and therefore they usually fail or provide very bad network performance in mobile sensor networks. Since WSN mobile applications have become popular nowadays, there is a need for MAC protocols that consider mobility. In this paper, we propose a mobility-aware MAC protocol for WSN that can work...
Remote monitoring and control of a multiunit industrial facility can be achieved by utilizing the Internet. Electrical, mechanical and a variety of devices are switched on, off, and regulated from distant terminals. Commercially available components were used to build the system. Various aspects related to the method of access, security, standards, and current trends are discussed. An eight unit system...
Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have too many investigations on the stego analysis systems, this paper will focus on the image file, the earlier...
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes...
This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system. This paper highlight the weakness of the hidden data technique (disadvantage, weak point, type of attacker, stage of attacking the massage, ..etc). This paper also appoint the...
Software is the core for computer-based applications which became an essential part for critical control systems, health and human life guard systems, financial and banking systems, educational and other system related to different aspects of human life. It requires qualified software engineers professionally and ethically. L.R and survey results show that software engineering professionals facing...
Patient monitoring systems still suffer from problems such as: lost of information, blur images, paper-based, and large number of patient with less staff in both local and foreign hospitals. In Malaysia, patient monitoring systems are implemented only at certain hospitals and wards. This research paper is focusing on developing Electronic Patients Medical Records (EPRM) system that will help make...
Most computers have connections to networks, which can be exploited through security cracking to gain access to any confidential data that may be stored on the computer. Thus, it is important to create some type of detection and prevention of the network from being attacked. Intrusion detection systems monitor computer networks looking for evidence of malicious actions. Networks are complex systems,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.