The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a packet length network covert channel and violators possibilities to build such a channel. Then the technique to estimate and limit the capacity of such channel is presented. The calculation is based on the information theory statements and helps to diminish the negative effects of covert channels in information systems, e.g. data leakage.
This paper introduces an approach to background subtraction from auto-exposure surveillance camera. The proposed method adapts the concept of codebook while the original codebook has a limitation in auto-exposure camera. These videos have light adjustment over time and it leads to brightness variation, and the variation could occur globally or locally. The proposed method uses the advantage of YCbCr...
In the present era of plurality and diversity in electronic world taking decision for choosing the best one from a pool of products is a prudent approach. Machine learning helps us a lot in deciding the optimal choice. Artificial Neural Network are a family of statistical learning algorithms inspired by biological neural networks and can be incorporated to take a decision at par with a smart human...
An increased number of social media plays a great role in the community and it has a huge positive impact on our day to day activity. However, there are some peoples associated with online anonymity by using multiple accounts and names to express their opinions on different issues. In this paper, we introduce our approach for detecting such kinds of anonymous authors by analyzing the content, the...
Wi-Fi broadcasting system is to offer multimedia streaming of the same quality to users even with increasing numbers of users by using broadcasting packet, not Unicast packet. However, the broadcast packet has high packet loss rate because it has not retransmission Medium Access Control (MAC) to recover the packet loss. Therefore, to prevent service quality degradation, a system should apply lost...
UDT (UDP-based Data Transfer) is a high speed transfer protocol which can utilize available bandwidth in Long Fat pipe Network (LFN) sufficiently. Meanwhile, it can estimate available bandwidth much greater than the actual available bandwidth when network status is congested resulting in fairness problem. UDT estimates MTR (Maximum Transfer Rate) using pair packets on receiver side and calculates...
In this paper, we propose a new message authentication code which can preserve privacy of data. The proposed mechanism supports to verify data integrity from only partly information of the original data. In addition, it is proved to be chosen-message-attack secure and privacy-preserving. We also conduct an experiment to compare its computation cost with a hash message authentication code.
Machine Leaning (ML) plays an important role in the electronic data management. It is always costly and difficult to manage the data manually without adopting ML or with ML using metadata. Many ML algorithms have been proposed to solve different data management issues, but the prediction of the confidential data and non- confidential data in a data file is still a challenging research gap. A file...
Due to the characteristics of fast read/write operation and small size, Solid State Drive (SSD) is now adopted as secondary storage device in place of Hard Disk Drive (HDD) for mobile devices. However, the shortcomings of SSD such as limited number of write operations and asymmetric read/write operation need to be solved. In this paper we propose a novel SSD block replacement scheme which considers...
The NFR (Non Functional Requirements) framework was used to quantitatively evaluate software architectures. Assurance cases using GSN (Goal Structuring Notation) have not been applied to quantitatively evaluate software architectures. In this paper, GSN will be extended to define quantitative attributes for this purpose. Then, the architecture evaluation method based on the attributed GSN method will...
Prototyping can be used to test business process or user interface flows. In this work, Requirements Analysis and Design Solution (RADS) is defined as the document describing the details of user interface design and flows. The document is part of the SRS prepared for the client to sign-off the requirements analysis phase. RADS provides screen design images and details. It also provides user interface...
ARINC 661 is a standard for the CDS (Cockpit Display Systems) defined by ARINC (Aeronautical Radio, Inc.). ARINC 661 contains various two-dimensional GUI (Graphical User Interface) definitions, which are displayed with its graphics primitives called Widgets. There is displayed almost graphics primitives with GP and Symbol Widget. The widget set covers a variety of graphics elements, including circles,...
In this paper we consider an extension of context -free Petri Net controlled grammars under parallel firing strategy: instead of a context-free petri net controlled grammars we consider an arbitrary case of Petri Net controlled grammars under parallel strategy. We study two modes of parallel firing called FULL and MAX and investigate their some properties
We are benefitting from the amazing changes taking place in terms of the Information and Communication Technology (ICT) and from the information devices that factored in these changes. As interest on health is increasing, effective monitoring, management, and protocol for the scientific and structured exercises are urgently called for. U-Fitness will be the realistic convergence system. Convergence...
Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.