The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The intelligent building system integration is a hot topic in the construction sector currently. The processing decision required to give in emergency, is to achieve the controlling, linkage, coordination and optimization goals, providing the time of escaping and passages for supervisors. In this paper, the mutual controlled monitoring and communication technology which is based on dual tone multi-frequency...
The following topics are dealt with: Internet technologies; multimedia over wireless networks; coding and channel estimation; routing and mobility; multicast routing; security and privacy.
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input...
Matrix embedding has been used to improve the embedding efficiency of steganography, which is an efficient method to enhance the concealment security. The privacy security of matrix embedding has also been studied under the condition of known-stego-object attack. However, with the development of steganalysis, the attacker could obtain the estimated cover by the cover restoration technique. Consequently,...
During the last years, need for increased funding for national health services offered to citizens is rising. The reasons are (i) decreased ratio of working population/pensioners, as well as (ii) increase of life expectancy. Thus, high priority should be given to safeguarding the reliable administration of the financial resources devoted to this purpose. This paper describes the application of a "clever"...
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently becomes a challenge. In this paper, a scheme to support query over encrypted data is proposed. Firstly, we extend two-phase framework to complete query, constructing different indexes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.