The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, keystroke logger is becoming a major security issue. Keystroke logger is a malware that steels user's keyboard input without his or her informed consent. Keyboard input related Application Programming Interfaces (APIs) are commonly used by keystroke logger software to illegally record users' keystrokes. This paper proposes a security scheme to protect against keystroke loggers by using a...
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. These networks are inherently vulnerable to security attacks from malicious users. Therefore, providing distinct security for ad hoc networks becomes a primary concern and requires several challenges to be achieved. One main challenge is how to manage public keys' certificates...
Guarantee of quality on industrial products is based on confirm whether materials, parts assembly and processing satisfy regulated standards or not. In some assemble process, it is hard to confirm the regulations are satisfied after once a work for the process have completed. For example, to fix a part using some screws, order to fasten the screws is regulated as a standard procedure to warrant accuracy...
Automated Trust Negotiation (ATN) is an approach to allow two participants to automatically verify whether their policies are consistent with each other or not. During the negotiation process, in order to protect privacy, both participants intend to disclose their credentials and policies as little as possible. A previous work(ATN)[14] successfully negotiates with perfect privacy preservation where...
Recently, the damage of billing fraud has been increasing, in which a fraudster asks a victim by telephone to pay money into the fraudster's bank account. So far, although several measures against billing fraud have been proposed, their usability and detection accuracies are still insufficient. Moreover, most of the measures will only work during conversation between the victim and the fraudster....
In order to realize digital ecosystems, the total electric power consumption of servers to perform application processes has to be reduced in information systems. Applications are classified into three types, computation, communication, and storage based types. In the computation and communication types of applications, CPU and communication resources of computers are mainly consumed, respectively...
The mobile Internet business is entering a new era in Japan with the emerging revenue being generated from mobile social games. Users using high-speed mobile Internet with flat-rate data services have acceptance of micro-payments and increased payment acceptance in mobile social games. This has been impacting mobile business and the game business in Japan for the last 12 months. Given the hype surrounding...
This paper deals with the problem of determination of probabilistic parameters for tasks in a series-parallel conditional task graph. Such problematic is encountered in the context of parallel computing when dealing with conditional precedence constrained parallel tasks on a multi-core machine. The conditional task graph was introduced in order to express conditional precedence constraints and thus...
Recently, immense multimedia information is exchanged on the Internet, where 3DCG, video, image, sound, and text are involved in various circumstances with different terminal devices, networks, and users with different knowledge and competence on using computers. This fact may easily lead to so called edigital divide' unless any special support is given to the users with few knowledge. We have already...
Video Forgery is a technique for generating fake video by altering, combining, or creating new video contents. We change the behavior of actors in a video. For instance, the outcome of a 100-meter race in the Olympic Game can be falsified. We track objects and segment motions using a modified mean shift mechanism. The resulting video layers can be played in different speeds and at different reference...
In this study, digital guide map that uses the tiled display wall was constructed. In the digital guide map used in the shopping mall or shopping street, it is necessary to present the suitable information to the users who visit there without definite purposes. This study aims at constructing the effective digital guide map by combining the functions of presenting the high resolution large image and...
This paper is concerned with the numerical analysis of propagation characteristics of electromagnetic waves traveling along two-dimensional (2D) random rough surface (RRS). Ray searching algorithm is based on 2D discrete ray tracing method (DRTM), and the field distribution corresponding to each searched ray is computed by using source and image diffraction coefficients. Numerical computations are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.