The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a space character based reversible high capacity text steganography scheme which embeds the secret data into a Microsoft word document. The scheme hides the secret data bits into the white spaces by changing their font type and style. Since the white spaces are invisible characters, the changes made in their style as well as in their font type do not raise suspicion. Thus,...
The purpose of this study is to demonstrate a teaching methodology in a general programming course for the first-year non-IT students at the Department of Informatics of Tallinn University of Technology, Estonia. The authors suggest some solutions for achieving better results in programming issues, which are usually sophisticated for the beginners in this field.
Experts on human-computer interaction (HCI) are required to establish communication media for a broad variety of users in consequence of the expanding services offered to the market and the changing technology landscapes. Software developers need suitable criteria to handle computer interfaces because of the diversity within the ‘digital population’ and it seems natural that educators should answer...
Computer science students use data array processing in many courses. To exploit the full power of caches and obtain higher performance, they mostly use the textbook example of sequential access of data arrays. However, a lot of discrepancies occur and the expected performance is not obtained in real life program executions, mostly due to the existence of several cache levels, with various architectures...
Inexpensive displays make large, tiled displays attractive for visual analysis and collaborative investigation. Especially in multi-user environments, the increased space allows to better organize the findings and results and, therefore, helps to improve collaboration. One important requirement is that all users can navigate seamlessly on the whole display space, while employing the standard software...
Virtual Reality is used in fields of cognitive sciences to study participants' reactions. In such cases, existence of other avatars in the virtual environment is a crucial factor. In this study we investigate whether agents have social influence on the participants by performing the Asch conformity experiment (1951) in an immersive virtual environment. Findings are demonstrating that participants'...
User performance in virtual environments with degraded visual conditions due to low frame rates is an interesting area of inquiry. Visual content shown in a low frame rate simulation has the quality of the original image, but persists for an extended period until the next frame is displayed (so-called high persistence-HP). An alternative, called low persistence (LP), involves displaying the rendered...
The cloud services are shared in one are more customers by pooling in a multitenant environment, which provides virtualized resources to the customer using different technologies. Virtual machine (VM) is a important software program, which is being used in cloud computing. It includes the behavior of the computer and also which is act as an implementation carrier to accomplish the running applications...
Protection of digital content from being tapped by intruders is a crucial task in the present generation of Internet world. In this paper, we proposed an implementation of new visual secret sharing scheme for gray level images using diamond theorem correlation. A secret image has broken into 4 × 4 non overlapped blocks and patterns of diamond theorem are applied sequentially to ensure the secure image...
Saliency detection is detecting the more attracted regions in an image. Like a loud noise in a quite environment. Saliency is the contrastic difference between the visually attracted items and their neighbourhood. Detecting such attracted areas in the image is termed to be saliency detection. Salient region detection can be broadly classified into contrast based method, learning based, rarity based...
With the highly development of media technology, the way to transmit information has changed significantly. Confronting with the challenge of age, book as the traditional media of information transfer should seek innovation strategy on the aspects of structure, function and form combined with the characteristics of electronic media. The structure of e-book can be multidirectional and irreflexive,...
Studying networking technologies has become one of the most important subjects in the field of Technology of junior high schools and Information Study of senior high schools in Japan. To study these subjects, studying with practically andexperimentally is strongly recommended by MEXT (Ministry ofEducation, Culture, Sports, Science and Technologies in Japan). However, there is little equipment for...
The objective of this review paper is to discuss about the strengths and weaknesses in the visual and audio CAPTCHAs. The basic techniques in breaking visual CAPTCHAs are discussed in detail. The issues regarding usability features are studied by choosing the user affinity by means of reaching the users through questionnaire. In order to avoid the risks in text-based CAPTCHAs, random images based...
Dimensions like the length and breadth of an object can be useful in the field of Human Computer Interaction (HCI) for applications such as Augmented Reality. Moreover, digitally measuring the length and breadth of an object can save the tediousness of performing many day-to-day activities like geometrical calculations involving real life objects. In this paper, we talk about finding the length and...
The DTI's current virtual shooting range detect only one shooting gun. If there are many gun shots upon the same training scenario, the system cannot know what gun shoot belongs to what gun. The goal of this research project is to prove the concept of developing an algorithm to classify gun identification. The gun identification plays an important role in multiple weapon shootings of the virtual shooting...
Research focused on values in information systems (IS) is conducted using a diversity of approaches, methods and theoretical frameworks. This paper presents a systematic literature review to investigate the relationship between values and materiality -- specifically, how researchers materialize values -- in IS research. Analysis of the literature demonstrates that IS researchers perceive the values...
Augmented reality (AR) is a growing phenomenon. We are on the verge of ubiquitously adopting Augmented Reality (AR) technologies to enhance our perception and help us see, hear, and feel our environments in new and enriched ways. AR will really change the way people see the universe. This paper provides a review on classification of different augmented reality challenges ranges from human factors...
This research proposes user interface requirement guidelines when designing a tour website for older people. At the moment, because of the increased shift from manual to an automated method to acquire services such as accessing a tour websites, it is important to give more attention to design and development that caters to the needs of the older people. Currently, there are some design problems in...
The usage of a simulation's visualization varies enormously within our community: for some, it is the simulation; for others, it is a development annoyance used for a screen-shot in presentations before the “proper” statistical results can be shown. Real-world systems are, for the most of us, explored visually so a simulation's visualization allows us to reconnect the simulation to its underlying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.