The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currency counterfeiting is one of the most important sources of economic anxiety among governments because of its significant threat to national economy. The present work aims at implementing a system to efficiently and accurately distinguish counterfeit Egyptian banknotes from genuine ones. The approach consists of a number of components including image processing, image histogram, color moments,...
Wireless technology having great application in office, home and business automation and it is a prominent field of research. ZigBee is built on the top of IEEE 802.15.4 standard for communication in wireless personal area network (WPAN). ZigBee is having feature of low cost of implementation, ease of access, low data over IEEE 802.15.4 standard and other traditional wireless network. ZigBee is mess...
Rapid development of communications over internet such as online money transaction, transaction of E-mail with sensitive data (medical data) and so on has led to need for strong cryptographic technique. There has been continuous research going on to assure strong security by various cryptanalyst. However, performance, computation time and ease of use play a significant role in using the algorithm...
E-payment systems by their nature are complex. Thus, with lack of well-designed formal models to provide a suitable method for their modelling and monitoring many challenging tasks will remain unsolvable. The present work aims at designing and implementing an e-Payment Protocols Formalism, PPF, to allow properties examination and verification for e-payment protocols. The proposed formalism was built...
Today Cyber-attacks are increasing and the security technologies so far we used are in capable of handling the large data sets of data. Now a day the attacks motive has changed from simple hacking, damaging to large scale network and server system. In the presence of fresh and formerly unknown activities, intrusion detection rate is inaccurate and low. Many research works are focused in this area...
A cryptographic system uses two dissimilar keys — a public key known to all and a private key known only to the receiver of the message. Encryption of the data uses public key while decryption uses both public and private keys. So in this method all parties need a key pair for conversing with any other interactive parties. RSA is a generally known asymmetric cryptography algorithm. Modified RSA is...
Rapid advances in the technologies of wireless communication have led to the evolution and empowerment of Wireless Body Area Network (WBAN). The health care applications are improved by using WBAN with the usage of different variety of sensors for monitoring the patient in order to diagnose any life threatening diseases. In recent past, several experts have concentrated in building system architecture...
P2P (Peer-to-Peer) network has extensive functionality in variety of fields. Accordingly, P2P users share huge amounts of data. The widespread usage of P2P systems can make it a potential truck for worms. The attractiveness of a particular P2P group can be reduced by widely spread malicious peers. Now internet community has concentrated more on its security. One of the solutions prevailing to prevent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.