The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fast transferring and sharing large multimedia files on the mobile network is a challenge. Most users encounter a long delay before playing a file; so this creates a bad experience for users. One common mechanism is to buffer the file to the internal memory before playing it. Hence, playing a large media file without long delay or interruption is a dream. This paper proposed a new mechanism, named...
Currently, Information exchanges between the organizations are significantly important. Although there is a standard Financial Information Exchange System, called as FIX, is implemented around the financial businesses, some important issues still are ignored. This paper proposes a new architecture to forward order and the financial information exchange pattern base on FIXML. This new proposed system...
Asthma is one of respiratory diseases that its symptom does not appear permanently. There are various situations that can be a stimuli for asthma symptoms. Thus, it is difficult to protect patients from an uncontrollable environment. Since most people in Thailand own smartphone either for their personal usage, such as note, calculator, calendar, or communicate with others via applications. Thus, this...
The network design techniques have been drawn out for years. The existing concepts are applied to organizations that have clear and stable policy. Thus, the implementation and maintenance can be performed easily within the estimated budget. Unfortunately, there are some organizations that cannot have a long term plan to activate. Therefore, changes in the network infrastructure can be affected and...
CAPTCHA, especially Text-based CAPTCHA, is the most widely used for security over the online environment in the present. That was used for identification automatic program computer and real human users. This technology was introduced by IBM that is a very high-end company in a very high-end country when comparing with countries in this study. This research was performed using a questionnaire to samples...
Currently, people uses mobile devices as a part of their lives. This leads to the risk of data leaking or stealing. Due to the security issue, there are many studies try to increase security in these devices. The authentication process was bringing to the device with hope that it will prevent users from the security's risk. Since the technology is developing fast, a new kind of risk comes to users...
The classical cryptographic primitives are constructed on the assumptions that the private key is securely kept and uniformly distributed. Learning parity with noise is a famous problem used to construct several cryptographic primitives. This research studies the open question about the hardness of the learning parity with noise assumption when the secret vector is not uniform and has sufficient min-entropy...
Currently, most authentication system requires users to answer the CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Human Apart) before gaining the system access. CAPTCHA is a standard security technology for distinguish between human and computer program automatically. The problem of using CAPTCHA is the difficulty of reading the text-based presentation, or interpreting the image-based...
Biometrics authentication is one of the powerful solutions that being used broadly in the Information Security due to its high effective and accurate results. Nevertheless, most of these methods require specific devices to gain input data. The keystroke dynamics authentication is a biometric technique that requires a common device which is a keyboard. Therefore, this biometric is a very useful technology...
CAPTCHA is the most important method for protecting malicious software gains access to the system through the Internet. However, this technique has many difficulties for users to solve their questions in various presentation styles. Therefore, the usability of CAPTCHA is a significant issue that all designers must concern; otherwise, authorized users will not be able to gain access to the required...
Presently, CAPTCHA is an important mechanism to gain access to the required system. However, there are some difficulties for users in typing CAPTCHA although they are authorized persons. Since the Text-based CAPTCHA is the most popular mechanism amongst all the CAPTCHA techniques, the difficulties of this text-based are studied and drawn out. The results of this study have shown that the presented...
The strong distinguishing attack is normally constructed based on Pearson's chi-square test. It uses several samples for increasing the correctness level. The number of samples is usually estimated to 1/ε2, where e is the random bits's bias. However, it lacks the method for verifing the accuracy of the strong distinguisher's advantage, given the number of samples. It may not obtain high advantage...
The multimedia file retrieval over the Internet has been counted as a popular service on the personal computer. However, the use of the Internet is shifting to the mobile devices especially smartphone. Various types of software have been proposed and sold via the operating system providers, such as iTunes of apple, Play Store of android, marketplace of Microsoft. As a result, the use of multimedia...
Presently, the web services are commonly used in web program development. These service agents may contain a nested call to other agents in order to complete their tasks. Therefore, the processing time of these agents may consume the processing time according to the external process of others. Moreover, there might be some errors within the external web agents. Therefore, the web service flows must...
Currently, the Internet is the largest source of information where people come to look for what they need. However, this information may be misinterpretation according to the existing of multiple verbs, or serial verb constructions (SVCs) in a sentence. Although many researchers have proposed various techniques to translate the available content, most of them are not overcome with the SVCs effects...
In this paper, we propose an alternative approach for verifying a conformance between choreography and the black box implementation of stateful Web service whose only external behaviors can be observed. Our framework uses an adapted version of Angluin's algorithm to infer a Mealy machine model that represents the observable behaviors of the implemented Web service. By transforming the Mealy machine...
A conformance problem between Web service choreography and orchestration has attracted much interest in the research field of Web service composition. A number of formal languages have been proposed for describing both choreography and orchestration. Moreover, various notions of conformance between them have been formally defined. In most of the earlier works, however, it is assumed that the internal...
at the present time, the increase of e-mail spam are heavy to cumber and the spam are vastly spread. These spams cause various problems to the Internet users, such as full incoming mailbox, and wasting time. Therefore, tremendous methods have been proposed but most of them have limitation in the mapping feature and processing time. This paper proposed a method that can detect a set of image e-mail...
Search engine is very important for searching image over the Internet. Recently, there are many search engine techniques which narrow down the real image requirement of uses. This paper proposed a new protocol: a specific image search protocol, named the Information Searching Protocol for Color Image (ISPCI). This protocol allows users to enter a part of a required URL with a partial image for searching...
At the present time, the high enlargement of spam e-mail is not easy to preclude and the spam is vastly stretch. These spam e-mails cause various problems to the Internet users, for instance full mailbox, and wasting time. Consequently, prodigious methods have been proposed but most of them have some limitations in mapping features and the processing times. Therefore, this paper proposed a novel method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.