The main objective of this work is to make a web site developer to understand the efficiency of the web site. the custom now among the web site users is to select the web site which is satisfying the needs of the user...
详细信息
Search is no doubt the most critical aspect of information computing over web. Ranking is pivotal for efficient web search as the search performance mainly depends upon the ranking results. The trade-off between the s...
详细信息
In this paper we are basically analyzing the results given by Wiener's, who says that if the private exponent d used in RSA cryptosystem is less than n^.292 than the system is insecure. We will focus on the result...
详细信息
Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online tr...
详细信息
Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online transactions. The biometric that has been chosen for implementation is fingerprint, since fingerprint biometric is easily available and highly reliable compared to many other biometrics. In the existing biometric authentication system the fingerprint template of a person is stored as such in the authentication server and is prone to security attacks at the server side. To overcome this kind of server side attack, in the proposed system the fingerprint template is divided into two or more shares using visual cryptographic technique followed by compression. One of these shares is stored into the server and the remaining shares are given to the users. Only these two participants who possess these transparencies can reconstruct the secret (biometric template) by superimposition of shares. This kind of approach solves two major problems related to fingerprint based automatic access control systems such as falsification and costly maintenance of the large fingerprint database.
While electronic commerce (E-commerce) which is over wired communication continues to impact the global business environment profoundly, technologies and applications are beginning to focus more on transactions over t...
详细信息
This work proposes an efficient realization of March test for fault detection in high speed memories. The realization is based on the theory of a modeling tool called cellular automata (CA). A special class of CA arch...
详细信息
This work proposes an efficient realization of March test for fault detection in high speed memories. The realization is based on the theory of a modeling tool called cellular automata (CA). A special class of CA architecture referred to as the SACA is considered for the test logic design. The test logic/hardware thus developed operates on the data read from the memory during March. It outputs an one-bit signature to detect faults in the memory chip, effectively reducing the comparison time required in conventional realization. The regular structure of CA enables low cost implementation of the test hardware for a memory chip, that is inherently regular in structure. The introduction of segmented CA structure further enables the drastic reduction in testing time.
A proof-of-principle research effort is presented to demonstrate the benefits of using a permanent magnet quadrupole focusing lattice to increase the beam current in a TWT. Recent work by researchers at the Naval Rese...
详细信息
CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA ...
详细信息
CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA forget the issues related to the usability as the objective of a CAPTCHA is to reduce the burden of solving it along with the robustness. In this paper, we have shown an analysis of some image based CAPTCHAs with different usability factors. This analysis is made manually with the data collected by the GWAP concept.
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for ac...
ISBN:
(纸本)9780945289418
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for active reading and engagement. The purpose of this project is to iteratively design a software system for slate type devices (e.g., iPad) to provide IBSVIs with equivalent reading experience as to sighted users. A participatory design (PD) approach is being adopted throughout the project by designing 'with' IBSVI users. The first PD session aimed to explore and obtain feedback on the different layouts of the overlays (tactile pattern over iPad to guide reading), different text densities, sonification, and navigation through the STAAR (Spatial Touch Audio Annotator and Reader) system. IBSVI consultants gave significant feedback and design inputs. Consultants also brainstormed with researchers for ideas to improve the features of the system.
In the field of information security, CAPTCHA technology is a recent successful achievement. Apart from using different text CAPTCHAs, image-based CAPTCHAs are also in existence. Though text based CAPTCHAs are in regu...
详细信息
In the field of information security, CAPTCHA technology is a recent successful achievement. Apart from using different text CAPTCHAs, image-based CAPTCHAs are also in existence. Though text based CAPTCHAs are in regular usage in internet services, the vulnerability in text CAPTCHAs has compiled us to move on to the image based CAPTCHAs. Therefore before implementing image based CAPTCHAs publicly, it is necessary to analyze the different complexity issues related to image based CAPTCHAs. In this paper we have presented the analyzed results based on the complexity issues including both space and time. The analysis is done on the data collected with the help of gamification of image based CAPTCHAs called CAPTCHINO.
暂无评论