The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud-based outsourced storage alleviates the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Nevertheless, the new conception does triggers lots of security issues. A major concern is how to ensure the integrity of the outsourced data. To deal with the problem, Chen et al. Recently proposed a remote data possession...
Examination system is the pivotal point around which the whole system of education is based. Examination system comprises of number of laborious and error prone tasks, needing immense resources and time. Numerous electronic examination systems have been designed with the intent of improving the efficiency of current examination system. However, the existing e-examination systems are usually designed...
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore how to provide cloud users with more controls so that they could ensure confidentiality of their data without using extensive public key encryption in cloud networking or sharing...
In this paper, we propose a communication protocol for an automatic report service to decrease damage from accidents and increase driver safety service for vehicles. The automatic incident report service is operated using V2X communication based on wireless access in vehicular environments (WAVE) to control the incident information from the accident car to the observing car. All observing cars can...
Professional skills are often emphasized in a capstone engineering design course, especially in relation to addressing ABET Engineering Criteria. Learning of these skills is typically a product of the project management approach followed by design teams. The principles behind agile development and the features of the Scrum methodology match up well with the expected outcomes of a major engineering...
Wireless Sensor Networks (WSN) and related technologies have the important impact nowadays. These technologies have variety of applications, and they are key enabling technologies of IoT (Internet of Things). ZigBee standard is the most common WSN technology. Its importance and expansion, as a widely used technology in many different areas, influence the importance of including ZigBee technology in...
In multi agent systems, agents interact with each other through a dialogue protocol to inform each other the relevant facts in order to reach the common goals. In a dialogue the protocol defines the possible replies for a presented speech act and the strategy specifies which speech act is premier. The strategy defines how to achieve the agents' goals by choosing the best one among all choices. Compared...
The Harn-Ren and Harn-Ren-Lin identity-based multisignature (IBMS) schemes are schemes derived from the RSA and GQ identity-based signature (IBS) schemes respectively. These IBMS schemes were claimed to be efficient based on two metrics - fixed length and constant verification time. This paper shows that both schemes suffer from similar flaws that allow adversaries to manipulate the list of signatories...
There is a widely accepted need for methodologies to verify the security of services. A typical service requires user data and then makes them available through the Internet independently from access platforms or user locations, but the layman is rarely aware of the entailed risks and seldom acts cautiously. The combined human-and-technology system is complex: it intertwines the technical protocols...
This paper explores drawing as a design medium for conceptualising ideas within the built environment professionals and its application through computer mediated environments and tangible interfaces in particular. Developments in human-computer interactions' technologies allow the integration of physical and digital realms. Furthermore, advances in multi-touch displays promote the hap tic experience,...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
Security over communication is totally essential especially for critical applications such as Military, Education and Financial applications. Unfortunately, many security mechanisms can be broken with new developments in classical computers. Quantum computers are capable of performing high speed simultaneous computations rather than sequentially as the case in classical computers do. In order to break...
The rapid evolution of Information Technologies (IT), especially with the coming of the Internet, has existed online library catalogues which have a vital part to play in Educational life. The online library is a type of information retrieval system. It is a library in which collections are stored in digital formats. These formats may be stored locally or entered remotely via computer networks. To...
A repository is an institutional-scale collection, which feeds off individuals' document collections. Repositories provide interfaces for users to deposit items, and this involves uploading the document and filling-in the metadata. These interfaces have been criticised for requiring time and effort on the part of the user, especially with the filling-in of the metadata. This paper presents a repository...
Crowd sourcing is changing the way people work and solve problems from "in-house working" to "public out-sourcing". Most online crowd sourcing platforms perform two main functions: (i) allowing users to advertise their tasks and (ii) helping them find candidate workers. However, they do not support crowd sourcing of complex work consisting of interdependent tasks. Those tasks require...
Goal-oriented visual search is performed when a person intentionally seeks a target in the visual environment. In augmented reality (AR) environments, visual search can be facilitated by augmenting virtual cues in the person's field of view. Traditional use of explicit AR cues can potentially degrade visual search performance due to the creation of distortions in the scene. An alternative to explicit...
LAN Chat Messenger (LCM) using VOIP offers zero cost communication among staffs in a company. Not limited to that, it is also allows them to chat, send files and free voice call. This study offers voice call and file transfer which helps to solve the communication issue especially on time and cost of the communication maintenance. The information exchange between individual becomes smoother and provides...
This project aimed to create a new communication system with high permeability, expandability reliability and which scope was appropriate to the environment of the distribution networks, enabling the implementation of monitoration, measurement and control of the devices on electricity distribution networks. The project was completed with field installation of a wireless mesh network fully functional,...
Dropbox, a popular cloud storage provider, pose several threats especially in terms of file security and unauthorized access. An Android and a web application which implemented Serpent cryptographic algorithm and One-Time Password (OTP) mechanism to secure files on Dropbox and a web application was built as a solution by utilizing Dropbox Application Programming Interface (API) and Bouncy Castle library...
Leveraging the computational power of the increasingly large core counts on a single chip requires scalable designs for cache coherence. The application-tailored approach eliminates redundancy in metadata storage and matches traffic to inherent application access and sharing behavior to allow scalability. The Web extra at http://youtu.be/LPQc45a9HjY is a video interview in which guest editor Srinivas...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.