The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
The following topics are dealt with: computational linguistics; data mining; data warehousing; bioinformatics; distributed computing; information security; ad hoc networks; information management; wireless sensor networks; and digital image processing.
Content and its associated information industry are going to become emerging market and content security has attracted more attention of researchers and enterprises. In order to solve these issues, starting with the information definition of Shannon, the paper defines and describes the content security architecture, which proposes a new layering model of information transmission and layering model...
The following topics are dealt with: intelligent system design; neural networks, AI and expert systems; evolutionary computation; genetic algorithms; natural language processing & machine translation; artificial life and artificial immune systems; rough and fuzzy rough set; gray system and cloud computing; cognitive radio and computer vision; pattern recognition and machine learning; fuzzy system...
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding mechanisms focus on information security and the data compression mechanisms emphasize the compression ratio. In fact, they are closely related. Until now, there are many literatures to...
The following topics are dealt with: genetic algorithm; information security; video and image processing; intelligent control; system theory and control theory; data mining; knowledge discovery; intelligent computing; intelligent systems; database engineering; software theory; and wireless and mobile computing.
The following topics are dealt with: data mining; robotics and controls; information security; wireless and mobile networks; ontology and algorithms; ubiquitous computing; telecommunications; software engineering; image processing; database and signal processing.
Information security concept methods are popular and attract much attention because they're foundation for realizing the Information security Semantic Web. a redundant concept of information security methods can be listed, such as inference engines, annotation tools, information security -based crawlers, and information mining tools, not to mention concepts themselves. Information security concept'...
The following topics are dealt with: optimization; data mining; bioinformatics; information security; software engineering; soft computing; distributed computing; parallel computing; web semantics; machine learning; computer architecture; real time system; uncertainty management; ad hoc networks and wireless sensor network.
Digital watermarking technology is a frontier research field, and it serves an important role in information security. According to the analysis of the definition and basic characteristics of digital watermarking technology, the system model of digital watermarking is given. The system consists of two modules which are watermark embedding module and watermark detection and extraction module. In view...
The following paper deals with the following topics: high performance computing; information systems; Internet; data mining; artificial intelligence; signal processing; image processing; e-commerce; e-learning; quantum computing; quantum communications; social computing; e-service; middleware; information security; ambient assisted living; wireless communication; software engineering; software testing;...
With the rising of data mining technology and the appearances of data stream and uncertain data technology etc, individual data, the enterprise data are possibly leaked at any moments, so the data security has become nowadays the main topic of information security. The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research...
Intrusion Detection system has become the main research focus in the area of information security. Dempster-Shafer theory of Evidence (DST) and rough set theory (RST) are two typically effective tools in dealing with uncertainty questions including network intrusion detection. In this paper, to solve some problems in applying DST, a hybrid approach of RST and DST is proposed. Firstly, to obtain basic...
The following topics are dealt with:data mining; data integration; decision modeling; energy systems; community planning; information security; risk analysis; human factors; environmental systems; sustainability; and agent-based simulation.
The following topics are dealt with: distributed scheduling approach; backup sip server system; raid system; fault detection; neighbor-aware dynamic backoff algorithm; ad hoc networks; IP transition phase; data sharing; large scale enterprise; data mining; distributed data warehouses; parallel discrete event simulation; peer-to-peer streaming; OpenMP; service oriented architecture; business process...
The following topics are dealt with: multimedia computing; information networking; information security; communication security; network security; cultural heritage environment security; information privacy; social network; watermarking; multimedia search; multimedia mining; mobile Internet; wireless network security; network steganography; service-oriented architecture; services computing; and multimedia...
Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an indispensable part of social life and industrial activity for mankind. In recent years, the demand for online banking has increased and the number of people who rely on online transactions has tremendously increased. Thus, necessity for a reliable security for online...
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust...
According to trusted computing standard, sealing provides assurance that sealed messages are bound to a set of platform metrics specified by the message sender, it ensures the security of data, but it can't handle asynchronous operation under multiple processes environment. An improved sealing method is given in this paper based on trusted storage, by introducing root of trust for reporting (RTR)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.