Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Name matching is a key component in various applications in our life like record linkage and data mining applications. This process suffers from multiple complexities such as matching data from different languages or data written by people from different cultures. In this paper, we present a new modified Cross-Language Levenshtein Distance (CLLD) algorithm that supports matching names across different...
This paper proposes a modification to standard cryptographic techniques. The key idea is to mitigate side channel attacks by dynamically changing the encryption key with redundant numbers at each encryption step. Side channel attacks currently are a major vulnerability; they exploit the implementation of the cryptosystem rather than attacking the cryptosystem. Side channel attacks have a wide range...
In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et al already developed Bit Level Encryption Standard ver-1, 2, 3, Bit level Multi way Feedback encryption standard. Recently Nath et al also developed 2-dimensional and 3-dimensional multiway feedback encryption standard. In the present...
Steganography is a method of hiding information, whereas the goal of cryptography is to make data unreadable. Both of these methodologies have their own advantages and disadvantages. Encrypted messages are easily detectable. If someone is spying on communication channel for encrypted message, he/she can easily identify the encrypted messages. Encryption may draw unnecessary attention to the transferred...
Interconnected vehicles are a growing commodity providing remote access to onboard systems for monitoring and controlling the state of the vehicle. Such features are built to facilitate and strengthen the owner's knowledge about its car but at the same time they impact its safety and security. Vehicles are not ready to be fully connected as various attacks are currently possible against their control...
An improvement of IEC-61123 in the field of sequential probability ratio test (SPRT) is proposed. The current standard does not provide a proper solution for modern industry's needs, and the test plans are not up-to-date with the knowledge in the area of sequential tests. The advantages of the proposed version are reflected by the efficacy and accuracy of the tests, the wider range of the ready to...
The typical Online Handwritten Text Recognition System contains four main phases which are: preprocessing, feature extraction, recognition, and post-processing phases. Preprocessing phase aims to reduce or remove imperfections caused during acquisition step. This phase is also used to minimize handwriting variations irrelevant for pattern classification which may exist in the text acquisition. The...
WordNet is the semantic word net, and played an important role in the field of natural language processing and information retrieval. It has also provided the basis for the building of national language word net in nations. Nowadays, most of the word net is using the same architecture as WordNet. The building of multilingual semantic net also reference to WordNet, or compatible with the WordNet. Therefore,...
Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has important implication as it focuses on the ethical part of the society as a whole. To address the issue of cyber...
This paper highlights different security threats and vulnerabilities that is being challenged in smart-grid utilizing Distributed Network Protocol (DNP3) as a real time communication protocol. Experimentally, we will demonstrate two scenarios of attacks, unsolicited message attack and data set injection. The experiments were run on a computer virtual environment and then simulated in DETER testbed...
This security system provides a cost-efficient alternative solution to intelligent security systems by using a standard webcam, personal computer, and a PIC microcontroller. This system uses a program developed in NI-LabVIEW which uses image processing. The said program only records the camera input once motion is detected, which reduces the duration of the video footage, disk space needed, as well...
Ergonomie devices are often designed to provide more comfort and to increase productivity but they can also help avoid pain and specific injuries. The ergonomic design of a computer keyboard needs expertise in ergonomics and biomechanics. The existence of a large category of typists with slow typing skills, visually searching the seemingly random keyboard, including novice users and the analysis of...
De-randomizer is one of the most important components in stochastic computing. We suggest an approximate parallel counter for the de-randomizer generating a small number of errors, which outperforms a conventional parallel counter in terms of area, delay, and power.
The exchange image file format (Exif) standard defines the specification for how to store metadata and ancillary tags for multimedia files. These tags are useful in documenting information about how the content in the multimedia file was collected, stored, and modified. The list of available tags are constantly being updated, with one of the most notable updates being the Global Positioning System...
With the rapid development of modern astronomical observational technology, the processing and analyzing of massive astronomical data bring us an unprecedented challenge. As an effective approach, Visualization Technology (VT) is becoming a hotspot for analyzing massive data. In this paper, in the lights of previous lieratures of visualization technology, we further discuss the possibilities of using...
The main goal of this paper is to present a simple and inexpensive software solution for remote management of PTZ camera systems EVI-D70CP. Performed analysis demonstrates the technological solution for control of multiple cameras within lecture room or laboratory. Paper deals with the differences in the various serial communication methods, various functionalities of camera systems, followed by a...
Internet and mobile computing have become a major societal force in that down-to-earth problems and issues are being addressed and sorted out. For this to be effective, information and content extraction need to be at a basic generic level to address different sources and types of web documents and preferably not dependent on any major software. The present study is a development in this direction...
A random sampling function Sample: U → {0, 1} for a key universe U is a distinguisher with probability. If for any given assignment of values v(x) to the keys x ε U, including at least one non-zero v(x) ≠ 0, the sampled sum ∑{v(x)|x ε U ^. Sample(x) = 1} is non-zero with probability at least Α...
Studies suggest that students' attitudes toward engineering courses may determine whether they persist in engineering, rather than academic performance alone. We take a mixed-methods approach to explore gritty attitudes and to confirm whether previous research on grit can be applied to undergraduate engineering students. We address two main research questions: (1) Does the grit scale predict retention...
Our institution has recently committed to develop five new entrepreneurially-minded elective courses called “IDEAS studios”. The entrepreneurially-minded aspects of IDEAS studios include close interaction with industrial partners and an emphasis on topics such as value proposition, opportunity recognition, intellectual property, and customer engagement. We hypothesize that in addition to specific...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.