Cloud Storage has been increasing in popularity recently due to per-use pricing and elastic scalability, providing a significant advantage over the typical acquisition and deployment of equipment that was previously r...
详细信息
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography method...
详细信息
ISBN:
(纸本)9781424455379
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents some new approaches for steganography in Indian Languages. Considering the availability of more characters and flexible grammar structure of Indian Languages this approach hide the secret message in the text by creating meaningful sentences after finding the longest common subsequence of two binary string among which one is the secret message and another may be any binary string. The collection of these created Indian sentences will be used as the cover media for this steganography method. Similarly by applying the reverse method to the cover me that is after finding the longest common subsequence of sentences from the cover me and replacing the matched character by the bits of another binary string the system extract the original message from the cover me.
The development of cloud storage services makes companies who outsourced their data to cloud storage server can39;t control their data by themselves as before. Then comes the security issues, especially the privacy ...
详细信息
In order to provide a more relaxing environment where the dental students can learn to memorize the fundamental knowledge as well as the processes and techniques in dental casting, we used the GBL concept as the basis...
详细信息
ISBN:
(纸本)9781424455379
In order to provide a more relaxing environment where the dental students can learn to memorize the fundamental knowledge as well as the processes and techniques in dental casting, we used the GBL concept as the basis to construct a system model. We had taken the process of dental lost-wax casting and integrated through gaming, the theories and practical skills in the dental casting course, to create this educational gaming program. The main functions of this program are to provide (1) a game involving dental casting simulation, (2) a game involving Q&A in dental casting theory, (3) user help during operation, (4) operation evaluation for user and (5) operation summary for user. In addition to the user interface in this program, We also incorporated an Haptic interactive device in wireless vibration feedback for more lively and diverse learning methods in dental casting for learners. This study aimed to establish a learning environment for dental casting through gaming that included the operation in dental lost-wax casting and the study of fundamental knowledge in dental casting.
As networks became an integral part of everyone39;s lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to ...
详细信息
ISBN:
(纸本)9781424455379
As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to secure the privacy of a networks but only big organizations are utilizing these technologies with their full potential as their implementation require costly resources. Here we have a comprehensive solution for network administrators who intend to maintain their networks private from others and want to conserve any confidential data. Our solution is based on a very simple practice that 'Network administrators should try hacking their networks themselves before bad guys do'. Many big organizations implements this practice by recruiting ethical hackers to analyze their networks but other organizations including government organizations of developing and under developed countries are still unable to preserve their network privacy. As a solution we have developed an online application which can be globally accessed and provides a very simple and easy to use interface for network administrators to use almost all popular exploits and network intrusion tools on their own networks and detect any possible network breach.
The running state monitoring of the power transformer is the effective method to lower its failure rate. Three windings power transformer and site environment as monitoring object, a multi-channels temperature acquisi...
详细信息
The color vision systems require a first step of classifying pixels in a given image into a discrete set of color classes. In this paper we introduce a new method of algorithm partitioning, and color image segmentatio...
详细信息
In the paper a novel improved genetic algorithm is proposed based on the maximum entropy for thresholding image segmentation. First of all, the encoded mode is made and the maximum entropy function is selected as the ...
详细信息
Based on the semiconductor heterojunction theory and three-layer model of Si-SiO2, the expressions of electroluminescence intensity ratio of interface layer to silicon core were deduced. The result can explain the low...
详细信息
ISBN:
(纸本)9781424455379
Based on the semiconductor heterojunction theory and three-layer model of Si-SiO2, the expressions of electroluminescence intensity ratio of interface layer to silicon core were deduced. The result can explain the low electroluminescence efficiency and the phenomenon of multi electroluminescence peak of nano-porous oxidized silicon well. Simulation results show that: 1) Delta E has a great influence on the recombination efficiency. The recombination efficiency of carriers in the heterojunction boundary is higher than other reigns. 2) Core and the interlayer can electro luminescence both, the apparent of luminescence peak position of nanoporous oxidized silicon photodiode and the phenomenon of multi-emission peak depend on the band gap difference of core and interlayer. The proposed methodologies in this paper have benefits on realizing full silicon-based optoelectronic integrated circuits
Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the f...
详细信息
暂无评论