The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detection of defective items from a colossal number of items, commonly referred to as "Group Testing", has been widely studied because of its promising applications in various fields. To detect at most d defective items from N items, a subset of N items is formed into a test and tested. If the total number of tests needed is t, a set of t tests can be seen as a t × N measurement matrix,...
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in...
Response Code (QR code) is widely used in daily life in recent years because it has high capacity encoding of data, damage resistance, fast decoding and other good characteristics. Since it is popular, people can use it to transmit secret information without inspection. The development of steganography in QR code lead to many problems arising. How to keep the original content of QR code and embed...
Though customer databases are so important, they can be sold under 95/46/EC and Data Protection Act law. This is a potential business. However, this business are encountering a big problem that purchaser wants to illegally distribute his database. We call them attacker. Attacker can use many schemes such as attribute, collusion and complimentary attack to achieve his goal. We have improved the technique...
Monitoring operation of thousands of servers and network devices on big data centers or server farms are very important roles for administrators to ensure that it well-operates, early detection of anomalies, fast errors correcting and decreasing discontinuous network. Network monitoring system detects anomalies such as attacks, states of hosts or services, resources. The aim of this is recognizes...
Wireless Sensor Networks (WSNs) become more and more popular nowadays. They are applied not only in civilian but also in military. However, when having numerous data, we have to preserve them secretly and can acknowledge which information we need. In this paper, while keeping data privacy, we focus on four queries: value query, range query, outlier query and hot items. Moreover, we can identify outlier...
Wireless Sensor Networks (WSNs) gain popularity these days. WSNs have been one of key technologies for the future with broad applications from the military to everyday life. There are two kinds of WSNs model models with sensors for sensing data and a server for receiving and processing queries from users, and models with special additional nodes, their common names are storage nodes, between the sensors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.