The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fake identities and identity theft are issues whose relevance is increasing in the social network domain. This paper deals with this problem by proposing an innovative approach which combines a collaborative mechanism implementing a trust graph with keystroke-dynamic-recognition techniques to trust identities. The trust of each node is computed on the basis of neighborhood recognition and behavioral...
A password-based authentication is a simple technique used for user authentication of computer or Web services. However, by shoulder surfing passwords can be stolen easily. To prevent these attacks, we need to shield our keypad from view by using our body or cupping our hand. To hide them easily, it is better that keypad itself or the range of inputting keys is small. We propose inputting a password...
The Examination System Based on the Word-VBA is developed based on Word software platform and uses the VBA programming language embedded in Word platform. Users can easily enter the examination system and complete test. The system can automatically judge right and wrong. In the system, it is more convenient for teachers to teach and assess the students. And it is also can save teachers' time and improve...
Different aspects of usage of electronic devices significantly vary person to person, and therefore, rigorous usage analysis exhibits its prospect in identifying a user in road to secure the devices. Different state-of-the-art approaches have investigated different aspects of the usage, such as typing speed and dwelling time, in isolation for identifying a user. However, investigation of multiple...
We propose a novel mechanism for enforcing information flow policies with support for declassification on event-driven programs. Declassification policies consist of two functions. First, a projection function specifies for each confidential event what information in the event can be declassified directly. This generalizes the traditional security labelling of inputs. Second, a stateful release function...
The Press and Publishing industry is the core of the cultural industry, and cultural industrial security is closely linked with Press and Publishing industry. The article first defined the connotation and content of China's industrial security of Press and Publishing industry, and then analyzed the security problems of Press and Publishing industry. Finally, the article put forward corresponding suggestions...
This paper presents the development of Digital Cultural Heritage Map (DCHM) application that is based on open source technologies and combines the power of web-mapping and multimedia. The project aspires to collect all the spatial cultural information about an area in one and only dynamic and easy to maintain and modify, website. The basic component of the website is the web-map. The user can perform...
In general the evaluation phase serves as a catalyst in software development and particularly within games development. Hence, it plays a vital role in the formulation of an effective a game development methodology. This paper has investigated the evaluation phase and has focused on the provision of general heuristics sets to facilitate the evaluation process. A generic evaluation framework has been...
Virtualization technologies enable multi-tenancy cloud business models by providing a scalable, shared resource platform for all tenants. Computing capacity, storage, and network are shared between multi-tenants. However, placing different customers' workloads on the same virtualization platform may lead to security vulnerabilities, which include the failure of mechanisms separating storage, memory,...
The definition of n-order complete four angles problem and n-order incomplete four angles problem are introduced firstly, and then the solving methods of odd and even order incomplete four angles problem are presented respectively. Furthermore, the corresponding computer algorithm of the methods is given to computer this kind of problem conveniently and effectively. Finally, three numerical examples...
This talk will summarize the University of Arizona Artificial Intelligence Lab's Dark Web research and discuss current and future development of a new GeoPolitical Web research program, which aims to study the emerging geopolitical events using advanced social media analytics techniques. The GeoPolital Web project is collecting longitudinal multilingual social media contents (forums, twitters, videos)...
Patterns are present everywhere in the world. Some exampels of where patterns can be found are in weather, traffic, social behaviour, music and text. The ability to recognize and understand these patterns is crucial for our ability to interpret the world around us. Thus, there are many research directions concerned with pattern analysis. In this paper we describe Pattern Theory, as formalized by Grenander,...
The problem of closest pair is a basic problem of computational geometry. This paper investigates the problem of privacy-preserving closet pair and designs a protocol. This protocol bases on Euclid-distance measure protocol and private comparison protocol. The main idea of this protocol is using the Euclid-distance measure protocol to respectively compute the distances of one party's one point and...
Current events such as the Park51 Project in downtown Manhattan create "critical discourse moments," explosions of discourse around a topic that can be exploited for data gathering. Policymakers have a need to understand the dynamics of public discussion in real time. Human values, which are cognitively related to attitudes and serve as reference points in moral argument, are important indicators...
Due to amazing development of network technology and increasing prevalence of network application, network is bound to penetrate into various arenas of social life. Naturally, as a significant infrastructure in colleges and universities, CAN is supposed to develop with high speed for the purpose of innovating education, elevating system of administration and teaching quality. However, security of...
With the economic development, penetration of the electronic commerce technology and internet technology into the socioeconomic life has brought the world exhibition industry new opportunity and challenge. Under the stimulus of the financial crisis, the network exhibition which develops exhibition by trade and promotes trade by exhibition as a result of the creation of a new exhibition model has been...
This paper use the gray single-level evaluation evaluate coal enterprises' security condition with a gray theory, let the coal enterprise's evaluation be more scientific and more realistic and provide a reference for the safe appraisal of coal enterprise.
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support for cloud computing. In cloud platform, power management is an indispensable function of cloud system administration. Based on genetic algorithm, this paper proposes a power management...
The author-owned patent of RFID technology was introduced into life cycle management for the Shipping container logistical management system for freight train. The latest logistical methods were adopted to optimize its processes. A RFID middleware system which connects RFID technology of internet of things with railway existing information systems was developed. This system might manage container...
The reform and exploration of the new rural social pension insurance system, have promoted the improvement of social pension insurance system. In the process to policy implementation, regional economic and cultural differences make policy implementation different. This comparative analysis will be used to the new rural social pension insurance system of the central regions. Western regions and East...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.