Suppose a weak power device Alice (e.g. a smart card) has some private program p. When carried outside, she may capture some private data x and want to compute p(x) but lacks the resources to do it. This paper present...
详细信息
ISBN:
(纸本)0769523153
Suppose a weak power device Alice (e.g. a smart card) has some private program p. When carried outside, she may capture some private data x and want to compute p(x) but lacks the resources to do it. This paper presents a solution that allows a semi-honest Bob to execute the program in such an oblivious way that both x and p are computationally hidden and p(x) is disclosed to Bob only if Alice so wishes. We describe a procedure of encrypting a general program as well as explore the information hiding properties. Our solution is generic for most deterministic polynomial-time programs and it provides a programming interface for Alice, a compiler for Carol and a circuit evaluator program for Bob.
This paper proposes a non-scanning display digital algorism both for still and moving picture. This innovative method is independent of display device or camera/transmission hardware configuration limited by the numbe...
详细信息
ISBN:
(纸本)076951507X
This paper proposes a non-scanning display digital algorism both for still and moving picture. This innovative method is independent of display device or camera/transmission hardware configuration limited by the number of scanning lines. The concept is the realization of effective image data transmission to display devices that is a change in the deviation of image is converted as digital bits data.
This paper presents a TETRA based mobile telecardiology model. Design considerations to transmitting wavelet based compressed ECG data using TETRA are discussed. The performance of transmitting compressed ECG signals ...
详细信息
ISBN:
(纸本)0769519164
This paper presents a TETRA based mobile telecardiology model. Design considerations to transmitting wavelet based compressed ECG data using TETRA are discussed. The performance of transmitting compressed ECG signals from a patient to a remote place (hospital or medical center) over TETRA network is evaluated in terms of BER and PRD. Frequency selective fading channels are considered during the simulation work. Results reveal the successful transmission of compressed ECG signal with low PRD and BER better than 10(-5).
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditional text-based documents. However, us...
详细信息
ISBN:
(纸本)0769523153
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditional text-based documents. However, users usually focus on a particular section of the page that presents the most relevant information to their interest. Therefore, Web documents classification needs to group and filter the pages based on their contents and relevant information. Many researches on Web mining report on mining Web structure and extracting information from web contents. However, they have focused on detecting tables that convey specific data, not the tables that are used as a mechanism for structuring the layout of Web pages. Case modeling of tables can be constructed based on structure abstraction. Furthermore, Ripple Down Rules (RDR) is used to implement knowledge organization and construction, because it supports a simple rule maintenance based on case and local validation.
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict...
详细信息
ISBN:
(纸本)0769523153
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict the direction of both Microsoft and Intel stock prices over a period of thirteen years. We explored the performance of artificial neural networks trained using backpropagation and conjugate gradient algorithm and a Mamdani and Takagi Sugeno Fuzzy inference system learned using neural learning and genetic algorithm. Once all the different models were built the last part of the experiment was to determine how much profit can be made using these methods versus a simple buy and hold technique.
MathChat is a protocol to support web-based chat sessions to simulate a classroom-type environment enabled for mathematics education. With MeML support, MathChat allows mathematics computation and display, which empow...
详细信息
ISBN:
(纸本)0769521088
MathChat is a protocol to support web-based chat sessions to simulate a classroom-type environment enabled for mathematics education. With MeML support, MathChat allows mathematics computation and display, which empowers mathematics educators to hold lectures and discussions outside the physical classroom. An online educational framework offers such advantages as more flexibility in scheduling and less apprehension to "shy" students.
Development of information systems and IT are continuously ongoing in almost every company and organisation. More and more of the IT development is performed in organisations characterised by professional work. Two st...
详细信息
ISBN:
(纸本)0769521088
Development of information systems and IT are continuously ongoing in almost every company and organisation. More and more of the IT development is performed in organisations characterised by professional work. Two studies are performed to point out two types of professions. One study is carried out at an airbase within the Swedish Air Force and one study is done in a health care organisation in Sweden. The aim of this paper is to describe and analyse the different types of the professional work in these organisations. Some implications in designing IT in different types of professional work are addressed.
Multiple description coding has been studied as an approach for transmission of images over error Prone environments. The multiple description coding method proposed here takes into account the content of the image an...
详细信息
ISBN:
(纸本)076951507X
Multiple description coding has been studied as an approach for transmission of images over error Prone environments. The multiple description coding method proposed here takes into account the content of the image and provides the least amount of degradation, caused by loss of descriptors, for those areas of the image which are of greater interest. This is achieved by employing a non-linear geometrical transform to odd redundancy mainly to the area of interest followed by a partitioning of the nonlinearly transformed image into sub-images which are coded and transmitted over separate channels, Simulations show that this approach yields exceptional performance even when only one descriptor is received. Moreover, the method proposed here can be implemented through pre- and post-processing of the image data, without modification to the source codecs (e.g., JPEG).
We describe our progress extending the undergraduate Computer Science (CS) curriculum to include a deep understanding of techniques for information and knowledge management systems (IKMS). In a novel five-course seque...
详细信息
ISBN:
(纸本)0769523153
We describe our progress extending the undergraduate Computer Science (CS) curriculum to include a deep understanding of techniques for information and knowledge management systems (IKMS). In a novel five-course sequence, students build and work with techniques for data mining, information retrieval, and text analysis, and develop a large-scale IKMS project. We teach in a hands-on lab setting where students use tools they have built, performing experiments that could extend the field Hence undergraduates have firsthand knowledge of performing CS research using scientific methods. Second, we utilize a rigorous set of evaluation criteria developed in our Psychology Institute to evaluate how well students learn using our approaches. Ultimately, we believe that this specialization warrants inclusion as an option in the standard undergraduate CS curriculum.
This paper reports on an overall methodology to develop a strategic architecture plan which can be applied to organizations. The deployment of the plan would allow for advanced implementation of technologies such as m...
详细信息
ISBN:
(纸本)0769523153
This paper reports on an overall methodology to develop a strategic architecture plan which can be applied to organizations. The deployment of the plan would allow for advanced implementation of technologies such as mass customization, customer relationship management systems, decision support systems and knowledge management systems. Despite advances in the development of new applications, many organizations are not able to embrace these new technologies mainly due to not having devised an appropriate plan to position themselves technologically and organizationally to incorporate these technologies. In many instances, organizations are even crippled to take advantage of the new competitive systems, because they lack the right standards and or suffering from old, mismatched and antiquated systems that they can not get rid of easily. The road map will provide organizations with specific technical requirements for the immediate needs as well as a migration path to "plug in" the component and the products the business is moving towards.
暂无评论