The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Summary Ultrasound (US)-guided fine-needle aspiration biopsy cytology is useful for diagnosing hard-to-palpate tumors or small-sized tumors. However, it is sometimes difficult to establish diagnosis of masses with insufficient samples or to manage the diagnosis of questionable features. The purpose of this study was to evaluate US-guided Mammotome biopsy for the diagnosis of breast masses in comparison...
With the development of Internet technology, people can conveniently exchange and share image/video without the limit of time and space. In one image/video, some parts can be open to the public and some cannot or only can be open to specific people because of privacy issue. How to protect privacy information in the image/video has become more and more important. This paper proposes a content (image/video)...
A privacy-secure content trading system based on semi-blind fingerprinting is presented. Semi-blind fingerprinting provides privacy-secure content trading as secure as blind fingerprinting at feasible processing cost with sufficient robustness. This system assures a fair trading for both a content provider and a purchaser which is effective for a market where a number of small or not so reliable content...
Reconstruction is of critical importance for computer forensics: reliability depends on our ability to do so with a quantifiable degree of certainty. In this paper, we propose a new model for computer forensic reconstruction by creating a mathematical model of a computer system that reliably shows how computation progressed. Since the new model is Turing machine-based, the reliability of other forensic...
As the Internet has reached every corner of the world as well as every aspect of our life, illegal activities go with it as well. In dealing with this phenomenon, a new professional and academic field, computer forensics, has emerged since the beginning of this century, The growth and advance of the new field has been steady, mainly because it has been following the path of forensic science due to...
We propose and evaluate a privacy-secure image trading framework using blind fingerprinting technique which embeds a user ID using watermark technique. The framework provides a privacy-secure trading even though there is no confidential relation between a content provider and a user. In a conventional fingerprinting scheme, a content provider offers a user ID embedded image to a user in order to trace...
Ensuring software quality in the presence of multiple software development methodologies such as agile and waterfall models is a challenging task. Web applications are released to customers in ldquoBetardquo mode due to tremendous pressure on ldquotime-to-marketrdquo. In order to check end-to-end functional behavior of web applications, conventional testing tools have not matched short release cycles...
Many national studies on computer forensics have been reported in the United Kingdom, the United States, and Australia, except Japan. As one of the economic powers in the world and the only Asian country represented in the G8, Japan has been playing a critical role in Asia as well as in the world in fighting against the cyber crime and cyber terrorism. In this paper, we attempted to analyze the current...
Collaborative Learning attracts attention as a new teaching method for its effectiveness of acquiring various skills. Recognizing the limit of current design of personal computer (PC) for collaborative learning in face-to-face environment, the authors have proposed a computer system called Socialized Computer (SC) that allows multiple users access to the computer with multiple mice and keyboards,...
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a new architecture integrating fingerprint with cryptosystem is proposed to protect contents from unauthorized access and illegal redistribution. We describe a scheme integrating anti-collusion...
When a small direct current, a few tens of amperes, is interrupted by a vacuum circuit breaker, small vibrations in the current sometimes appear. The authors call these vibrations as arc unstable phenomena. Present investigations show that the phenomena occur earlier by the smaller value of the interrupted current and larger value of parallel capacitance
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this proposed system, contents are broadcast to all terminals using IP multicast. Contents are encrypted so that legitimate users can decode them with a private key and session keys. As a key management scheme, the Tracing Traitor...
Data dependence analysis (DDA) is essential for any automatic parallelizing compiler to determine parallelizability of given portions of programs. Several techniques and tests to analyze data dependence between array elements have already been proposed. It is clear that when one examines these conventional DDA techniques, there exists a trade-off between their analysis speed and exactness of their...
Inland navigation played a key role in physical distribution in earlier times. As railways and roads developed, however, inland navigation declined. Recently, inland navigation has drawn renewed attention due to its ability to reduce physical distribution costs and mitigate global environmental concerns. Ishikari River is located in a cold region, and it is known that the water surface is freezes...
We propose a secure video authentication algorithm that is tolerant to visual degradation due to MPEG lossy compression to a designed level. The authentication process generates a tag that is sent with video data and the level of protection can be adjusted so that longer tags are used for higher security, and that the protection is distributed such that higher security is provided for regions of interest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.