The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper finds that after ADRs were issued, the companies average abnormal return generated through merger activities increased significantly, and the average abnormal returns generated through cross-border merger activities increased from 2.3% to 2.9% compared to before the issuance of ADRs. This is because the issuance of ADRs not only strengthens the level of supervision, and reduces the directors'...
If we can acquire the reviews and comments from social networks or Internet forums about a certain enterprise's products, services or activities, these reviews and comments can be valuable to the enterprise because it can use the information to improve products and services or fix problems in a timely manner. The traditional sources of collecting clients' opinions include surveys with questionnaires,...
For large-scale networking environments, grouping network nodes into clusters is a key technique to achieve the scalability objective. This paper addresses cycle-based node clustering in the crossed cube architecture. Let r be a positive integer. For any r distinct vertices v1, …, vr of a network G = (V, E), G is said to be spanning (v1, …, vr)-cyclable if there exists a set of r vertex-disjoint cycles...
Appliance load monitoring is critical to household energy management. In recent years, non-intrusive load monitoring (NILM) is considered as an attractive method for appliance load monitoring, as it aims to separate household energy consumption data collected from a single point of measurement into appliance-level consumption data. While the NILM idea seems feasible, practical NILM implementation...
Cryptographic libraries usually do not ensure the situation that the execution environment is rapidly and diversely changed because it has structural incompleteness by design. Microsoft announced the CNG library to solve this problem. Nevertheless, the CNG library does not have the verification tools regarding the execution results for developers, users or experts to assess the crypto system implemented...
In this paper, we outline security issues on IEEE 1149.1 JTAG. The JTAG interface is provided for its beneficial features, such as debugging and downloading firmware, but attackers are abusing it by reverse engineering and by modifying firmware. Hence, they are able to steal confidential information in the system or are able clone the embedded system. In order to solve this problem, a variety of security...
Aiming at the problem in image information security, a novel hybrid algorithm based on Hill matrix and Haar domain sequence was proposed. According to the reality, it could get the final encrypted image by suffering a series of sub-algorithms such as the self-reversible matrix, enhancing the Haar wavelet transform, two-dimensional chaotic mapping and hierarchical block scrambling. Finally, the paper...
In this paper, we investigate the impacts of frequency selectivity on the error performance of time-domain equalizers in multiple-input multiple-output (MIMO) systems. Two types of time-domain equalizers are considered: linear equalizers and decision-feedback equalizers. Under the assumption of the perfect channel estimation at the receiver, the error performance of both linear and nonlinear equalizers...
In recent years, cloud storage has been popularly used by people in different areas to store their personal or commercial data so as to make the data able to be accessed anytime and anywhere. However, when data is distributed to many locations, the risk of unauthorized access will increase. To secure cloud storage, data is often encrypted by using one encryption key, which is shared by those people...
This study aims to propose a general strategy for establishing and implementing IoT industry promotion policies, by analyzing a broad range of issues related with the developmental direction of the IoT industry, and by suggesting appropriate development strategies. This study proposes four implementation strategies to view the direction of IoT development at the general level, and discusses appropriate...
In this study, we develop a secure high-performance WSN, named the Secure and High-performance WSN based on Symmetric-key Matrix (SHWSM for short), which exploits a symmetric key as a channel key to improve the key-exchange performance of a network when a node is newly added to the network. We also use time key, random key, system group key, individual symmetric key and system group table etc, as...
In order to effectively manage resource, control time and reduce development risk, small scale or high changeable software project very suitable use IID (Iterative Incremental Development) process. Applying IID process, agile development model becomes the practical method to reduce software project failure rate. Continuous testing is an IID implementation concept which can timely identify the quality...
This study is directed for the information security education of the elementary students. The purpose of this paper is to examine that information ethics and information security awareness affect information security practice of elementary students. 192 valid questionnaires from elementary students of South Korea were collected, and then these were analyzed using structural equation modelling. The...
Emergency Communication System (ECS) becomes more and more important for certain emergency situations such as the affected mountainous areas, temporary battlefield, or filed of fire. Self-organizing network is proverbially adopted by ECS due to its flexible and robust architecture. However, the moving range and mode of mobile node in self-organizing network, especially mobile gateway, constrain the...
Context-aware applications in mobile devices use various sensors for inferring context to provide high-quality services. However, mobile devices have limited battery life and sensors consume much power. There have been many approaches for energy efficient sensor usage, but specified sensor operations considering context-aware application give more chance to decrease the power consumption of sensor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.