The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper modifies an elegant data hiding method of Chang et alpsilas [Pattern Recog. Lett. 2004, vol. 25, no. 11, 1253-1261]. The embedding employs a modified search-order coding (SOC) technique to hide binary secret data in the vector quantization (VQ) index file of a host image. The recovered host image is identical to the one recovered by traditional VQ; the compression rate is competitive to...
It is necessary to analyze the anti-terrorism performance of Taiwanpsilas security system after September 11, 2001 attacks. We use three stage data envelopment analysis model that Fried et al. (2002) developed, getting intelligence performance of the Investigation Bureau of the Ministry of Justice, to discuss the ability of anti-terrorism in Taiwanpsilas national security system. Putting 10 outputs,...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
With the rapid growth of the Internet and database technologies in recent years, question answering systems (QAS) have emerged as important applications. As most evaluation models focus on system-centered evaluation, user-centered evaluation has attracted little attention. Although many QAS have been implemented, little work has been done on the development of a user-centered evaluation for QAS. User-centered...
In this article, we propose a general-purpose disaster support system based on generalized (multiplicatively-weighted order-k Minkowski-metric) Voronoi diagrams. The proposed system is capable of handling disasters (or emergency units) having different weights in the complete order from 1 to k in the three popular Minkowski metrics (Euclidean, Manhattan and Maximum distance space). The proposed model...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.