The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, one example of Paillier's encryption schemes and homomorphic encryption was illustrated. In mathematical details, Subtraction, Multiply, Division binary operation of binary based integer number operands was presented. In particular, the secrecy of encryption and decryption will be shown. Both operands were still encrypted even through an other operation was processing.
Approximating a hand-written curve by a Bézier curve can be performed by two main processes: (1) the selection of the significant points on the curve and (2) the curve approximation. This paper focuses on finding a set of featured points, which is an important component for curve fitting into a Bézier curve. This new approach is an extension of the authors' previous work by reducing the weakness of...
This paper presents two methodologies for approximating a handwritten curve by a Bézier curve using Chebyshev Polynomials. First, two different featured point selection techniques, are introduced in algorithms 1 and 2. Algorithm 1 uses frequency while algorithm 2 uses the analysis of inflection point. Then, using Chebyshev Polynomials for approximation curve, however a new curve must be adjusted by...
The technology of web 2.0 especially social networking has changed people's behavior, attitudes, interactions, and relationships. User activities on social networking sites have created both explicit and implicit relationship. The relations can be distinguished for the sites with symmetric and asymmetric relationship types. In this paper, we propose a framework for semantic social network analysis...
Sys-log message is the importance data which could present information about internet source-destination connection of all IP address nodes in each network server. These sys-log messages must be securely kept in database in case of being referenced, such as legal requesting. The objective of this research was to develop a security protocol of system log message database manipulation. Message was split...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.