The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discuss about a more secure way of sharing the text data by hiding the text data in images by steganography and convert the image into random shares through Multi-Secret Image Sharing scheme. Multi-Secret Image Sharing (MSIS) scheme shares n secret images among n shared images. In this scheme, there are n shares generated from n secrets images and to recover all n secret image we need all...
Compared with other information technologies (e.g., desk computers), smartphones are being used anytime anywhere, which shows the unique phenomenon of extensive exposure. However, to date, the information system literature still doesn't fully understand the association between extensive exposure and information technology usage. The purpose of this paper is to investigate whether and how extensive...
Research focused on values in information systems (IS) is conducted using a diversity of approaches, methods and theoretical frameworks. This paper presents a systematic literature review to investigate the relationship between values and materiality -- specifically, how researchers materialize values -- in IS research. Analysis of the literature demonstrates that IS researchers perceive the values...
Green Information Technology (GIT) is emerging as an increasingly important issue as organizations come under pressure to address environmental sustainability concerns. Despite increased attention from business, government and more recently, Information Systems (IS) researchers, a measure to determine the capability of organizations to Green their IT remains elusive. The ultimate aim is to utilize...
With the phenomenal increase in digital data, it is inefficient to run the traditional clustering algorithms on separate servers. To deal with this problem, researchers are migrating to distribute environment to implement the traditional clustering algorithms, more specifically K-means clustering. In traditional K Means Clustering, the problem of instability caused by the random initial centers exists...
Women comprise over 49.19% of the population of Pakistan. The number of women enrolling in Computer Science and Information Technology is 14%. Computer science (CS) and Information Technology (IT) is becoming ever present in the lives of young people, including girls and young women, yet education and employment in technology fields are not attracting women. The main focus of this research study is...
This paper describes a content analysis study that analyzed the subject matter of computing ethics. The purpose of the study was to begin the process of providing a coherent concept of the subject matter of computing ethics. The snapshot presented is based on article titles from four prominent journals with a computing ethics scope. This paper discusses subject matter themes that emerged from the...
Ranking is an important operation in web searching. Among many ranking algorithms, PageRank is a most notable one. However, sequential PageRank computing on a large web-link graph is not efficient. To address such limitation, parallel PageRank implemented on Message Passing Interface (MPI) is a viable choice. Generally speaking, MPI-PageRank will be implemented using a root node and many computing,...
The growing use of Location Based Social Networks especially in recent years provides large amount of data transactions. These data transactions attract many data mining researchers to infer various information from them. In this paper, a geographic business prediction technique is proposed, which infers business usage by exploiting data published about venues in Location Based Social Networks. The...
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party computation and function sharing schemes. On the other hand, cheating problem in (k,n) secret sharing is an important issue, such that cheaters (dishonest players) submit forged shares...
Through support from the National Center for Women & Information Technology (NCWIT), the University of Texas at El Paso (UTEP) and the El Paso Community College (EPCC) began a program to collaborate on adoption of Peer-Led Team Learning (PLTL) at EPCC. The NCWIT-funded effort aims to transfer this effective retention practice to the EPCC in order to establish early connections with female students,...
We explore the problem of Chinese character description and font designing in this paper, a novel dynamic description method for Chinese character was proposed. This method includes a dynamic description algorithm by using stroke-segments-vector, stroke elements and generation algorithm by using feature points and their weights, characteristic expression and weight vector of the feature points. Our...
The role of computer and information literacy in the contemporary digital society is as important as language proficiency. This is widely exemplified in the graduate requirements in many tertiary institutions: students must pass the compulsory IT subject(s), often as a mandatory General Education (GE) course, before graduation irrespective of majors. Challenges arise to the computer science faculty...
One of the most significant characteristic features of digital histological images is changing of the form of microobjects (cells) of the same class. The requirement to corresponding points is the stability of their position on the contour, i.e. invariance of their position during rotation, translation. The proposed algorithm of determining the corresponding points on the basis of the central moments...
Recreational nature experiences are rehabilitative for humans. Nature-oriented virtual environments (VEs) might be able to provide similar experiences. A pilot study have shown to increase the enjoyment of an exercise experience for retirement home residents, by augmenting their everyday bike exercise with a custom made recreational VE. This paper proposed a set of guidelines with design considerations...
THESEUS is an energy-efficient routing system for Shared Sensor Networks (SSNs), with the primary goal of extending network lifetime. THESEUS has two features that distinguish it from other works found in the literature. First, it saves SSN nodes energy by using a packet aggregation algorithm, which reduces the number of transmissions. Second, THESEUS balances energy usage in the whole SSN by its...
In this paper, a session resumption-based end-to-end security scheme for healthcare Internet of things (IoT) is pro-posed. The proposed scheme is realized by employing certificate-based DTLS handshake between end-users and smart gatewaysas well as utilizing DTLS session resumption technique. Smartgateways enable the sensors to no longer need to authenticateand authorize remote end-users by handing...
REVERIE (REal and Virtual Engagement in Realistic Immersive Environments) [1] is a multimedia and multimodal framework, which supports the creation of immersive games. The framework supports the creation of games integrating technologies such as 3D spatial audio, detection of the player's body movement using Kinect and WIMO sensors, NPCs (Non-Playable Characters) with advanced AI capabilities featuring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.