The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the issues such as the thin algorithm, attack sensitivity, narrow applications restrict the development of text watermark technology. This paper purposes to coordinate multi-watermarking algorithms to work collaboratively by polymorphism watermarking algorithm. We extract the relevant classification characteristics and discuss the defining polymorphism watermarking algorithm, and focus on...
WEB service matching is of great significance in automatic composition and intelligent dynamic composition of services and the service matching algorithm is the key factor determining efficient and fast service matching. Most of the traditional service matching algorithms are syntax-based service matching and are lack of the description of semantics, which will seriously affect the precision and recall...
As the use of prophylactic cranial irradiation (PCI) increases life expectancy in certain types of cancer, there is evidence that this technique may contribute to neurocognitive deficits. The aim of this research is to investigate functional connectivity in patients before and after being administered brain radiotherapy as well as their neurocognitive functionality, depending on the course of disease...
SWAN-iCare is an ambitious project which will provide a major leap forward in the management of chronic wounds, mainly diabetic foot ulcers (DFU) and venous leg ulcers (VLU). It aims at a next generation integrated solution for remote monitoring and personalized therapy of foot and leg ulcers, as well as providing an objective continuous evaluation of the wound condition, in contrast to the current...
Virtual network is an important part of the cloud computing, Its management is achieved by the Quantum component of Open stack, which is one of the most popular cloud management platform. Currently, Quantum component has two deployment plans that is the single-host plan and the multi-host plan. Others' lab previously about the comparison of two deployment plans is incomplete and unsatisfactory. In...
This paper uses the present-value model of current account to analyze the reason for China's current account imbalances for the 1982-2010 periods. The results show that the consumption tilting parameter of China's residents in the same period is 1.127. This means that the Chinese residents' consumption is less than the persistent cash flow; residents will transfer their consumption to the future,...
Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. In this paper, we present a new paradigm that leverages software attack graph for dynamic remote attestation. The major contributions of this paper are two-folds: (1) From the angle of attack, we propose a method to reduce the number of objects...
Some authenticated data structures (ADS) can reduce authentication cost with using signature aggregation method, such as authenticated skip list, merkle hash tree etc. But these ADS cannot solve the complicated authenticated problems, such as relational query authentication. Pang et al present signature chain scheme aims at various types of relational query but has high cost. Therefore an improved...
This paper investigates the outage performance of dual-hop amplify-and-forward (AF) two-way relaying systems with multiple co-channel interferers at the AF relay and two noisy end-sources. For such, a tight closed-form approximation is derived for the outage probability of the considered systems. In particular, in high SIR regions, with an increasing system SIR, the outage performance does not vary...
This paper proposes a research framework for graphic digital text Watermarking algorithms and methods. We summarized graphic text watermarking after a brief review of digital text watermarking, and propose the research framework that consists of 8 levels, such as pixel, line, etymon, character, row, paragraph, page, and chapter. According to the embedding methods, each level is divided into three...
Through this work we had created a platform that will support the emergency health care procedures starting from an emergency call until a patient is transferred to a central hospital. The platform consists of a) a system that supports emergency dispatch protocols, b) data recording and workflow management of ambulance department and c) an emergency telemedicine system which can support patient handling...
It is extremely important that the semantic relation between the information resources for organizing and hunting for information. Many semantic connections are lost between online information resources and off-line information resources. Topic map is a discipline-specific form of concept map, which is generally a representation of concepts about the information and relationship rather than of knowledge...
How to make software developers focus on building the basic infrastructure and enabling environment and the business users themselves configure the resources to fulfill their certain requirements is critical. To support rapid service coordination system, the method of redesigning and redeploying is needed. Business events are changes of state in enterprises or business correlated cases under the condition...
In this paper we present key factors for the understanding and acting over behaviors, in order to facilitate healthier aging and wellbeing: motivational theories, health behavioral change theories and physiological constraints of aging. The successful deployment of these related theories can be accomplished through personalized mobile technologies based on behavioral and motivational models that can...
One of the most challenging limitations for the elderly and/or the visually impaired people is the inability of self-navigation in unfamiliar indoor environments. Numerous existing indoor navigation systems have been proposed in order to solve such problems. However, these papers do not adequately examine the effectiveness of the systems in real time trials and are faced with a variety of technical...
Cloud-based outsourced storage alleviates the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Nevertheless, the new conception does triggers lots of security issues. A major concern is how to ensure the integrity of the outsourced data. To deal with the problem, Chen et al. Recently proposed a remote data possession...
This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's...
Session hijacking attacks of social network websites are one of the commonly experienced cyber threats in today's Internet especially with the unprecedented proliferation of wireless networks and mobile applications. To address this problem, we propose a cache supported hybrid two-dimensional one-way hash construction to handle social networks' user sessions authentication in collaborative applications...
Understanding the capabilities of adversaries (e.g., how much the adversary knows about a target) is important for building strong security defenses. Computing an adversary's knowledge about a target requires new modeling techniques and experimental methods. Our work describes a quantitative analysis technique for modeling an adversary's knowledge about private information at workplace. Our technical...
Social networks, personal blog pages, on-line transaction web-sites, expertise web pages and location based social networks provide an attractive platform for millions of users to share opinions, comments, ratings, etc. Having this kind of diverse and comprehensive information leads to difficulties for users to reach the most appropriate and reliable conclusions. Recommendation systems form one of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.