The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The linear array 3D imaging sensor uses a common optical path system to acquire image and point cloud data at the same time. The registration of these two types of data is realized by the common optical axis alignment and time synchronous control system. Since the image and point cloud data have different sampling frequencies; the process of generating colored point cloud needs to interpolate the...
We address a well known problem of computer science, the problem of computing the probability that a given number of people m > 1 have the same birthday from among the members of a larger set of cardinality n ≥ m. The solution to this problem for m = 2 is well known and is usually referred to as the ‘birthday surprise probability’. A solution for m = 3 is also known and appears in the 2004 paper...
This paper contains the first considerations of a computer scientist approaching the digital forensic. After some years of consultancies for both judges and parties I developed some thoughts that probably are worthwhile to share.
In human written computer programs, loops and recursion are very important structures. Many real-world applications require recursion and loops. Loops and recursion can also be achieved by using genetic programming (GP). There has been a lot of work on GP for loops but not much on recursion. Our recent initial work on GP for recursion has shown that GP can be used to solve recursion problems, based...
Significant benefits, like an IT cost savings, security, customability, knowledge sharing, can be achieved through the introduction and use of Free/Libre and Open Source Software (FLOSS) in high schools. By using FLOSS, level of students' innovation, computer literacy, knowledge and creativity could be increased. That benefit could be important for developing countries as a chance for strengthen local...
In this work, we propose a design flow for automatic generation of hardware sandboxes purposed for IP security in trusted system-on-chips (SoCs). Our tool CAPSL, the Component Authentication Process for Sandboxed Layouts, is capable of detecting trojan activation and nullifying possible damage to a system at run-time, avoiding complex pre-fabrication and pre-deployment testing for trojans. Our approach...
Logic locking is an intellectual property (IP) protection technique that prevents IP piracy, reverse engineering and overbuilding attacks by the untrusted foundry or endusers. Existing logic locking techniques are all vulnerable to various attacks, such as sensitization, key-pruning and signal skew analysis enabled removal attacks. In this paper, we propose TTLock that provably withstands all known...
With the developing digital era, the users are more vulnerable to various types of security threats such as Phishing(RAT), a serious security threat to the internet users in which the intruder sends an email which looks legitimate, where the RATs are usually downloaded invisibly with a user - requested program such as game or in this case an email attachment. RATs provide a backdoor for administrative...
Nowadays, password-based authentication is one of the most widely used methods to authenticate a user before granting accesses to secured websites. Password reuses within the same website and across multiple ones can enable shadow attacks. In this project, we study web password reuses by analysing a large number of sample data and combine dynamic authentication factor to achieve better efficiency...
The advance of CMOS process is still going, but the end is coming into sight. Semiconductor chips with advanced process later than 21nm are so expensive that they are developed only for million selling products. On the other hand, the advanced AI, IoT and big data technologies require more and more computation/communication power with a tightly limited power budget. How we can develop a “Cool chips”...
A purpose of our research is to provide a design of a pseudorandom number generator with the logistic map over integers. In the presented paper, we will discuss an influence of a control parameter on outputs generated by the logistic map. Additionally, this result will give a design guide about an interval of a bit extraction from values by the logistic map. Concretely, we will analyze experimentally...
A card-based protocol enables parties to securely compute a desired function by using physical cards instead of computer devices. Most of the previous works have aimed to achieve protocols with a smaller number of cards for elementary functions (e.g., AND/XOR/COPY). Mizuki and Shizuya's protocols achieve the smallest numbers of cards among the existing protocols. Their XOR and COPY protocols can be...
We have been investigating behaviors of the logistic map over integers for constructing a pseudorandom number generator with the map. In the presented paper, we will give a 0/1-occurrence rate per bit for values by the logistic map over integers, and discuss suitable bit positions of a bit extraction for getting a pseudorandom bit sequence. First, we will show characteristic behaviors of occurrence...
This case study is about the introduction of computer science to girls in an all-girl environment. Due to the lack of women in technology, many efforts are being made to expose girls to computer programming at an early age. Code camp organizers are using the all-girl model to help put participants more at ease and boost their computing confidence. High computer self-efficacy leads to studying computer...
The development of three modular Rabin's encryption algorithm with using ordinary integer and modified perfect forms of the system of residual classes is presented in this paper. This method takes precedence over classic in choosing modules of the same order in sustainability by increasing the block of plaintext for encryption. New methods for implementation of major labor-intensive operations of...
In this paper, I provide the Miller Methodology forminimizing the amount of effort necessary for assessing studentoutcomes through ABET accreditation. A single faculty memberis responsible for gathering of the outcome data, and the entireprogram faculty can then assess the data as it related to thecontinuous improvement process. This methodology provides foran efficient use of the time of faculty...
Technology needs to be eco-friendly most importantly microchips need to be redesigned and manufactured in an eco-friendly manner since they are the heart of all technology. With a look to the future its not hard for one to conclude that silicon will meet its fate. Wise men said the best time to plant a tree was 20 years ago and the second best time is now. Silicon microchips have been the primary...
This paper proposes an approach of recommending micro-learning path based on improved ant colony optimization algorithm. Micro-learning is a new learning style, which can be used to support learning in short time because of its micro-learning units. Each micro-learning unit consists of a small knowledge unit that can be learned at fragmented time. Meanwhile, micro-learning is more flexible than other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.