This paper proposes an audio zero-watermarking algorithm based on Fast Fourier Transform (FFT).This algorithm does not change any contents about the audio signals. It proposes a solution about the contradictions about...
详细信息
For many institutions, maintaining ABET accreditation(s) requires a significant investment of faculty and financial resources. This is especially the case since the technology Criteria 2000 were introduced requiring a...
详细信息
The ever increasing diversity and mobility of devices have originated a marked rise in ubiquitous resources;a great number of collaborative applications could be exploited just by employing an efficient ubiquitous res...
详细信息
Ontologies are often represented as a graph where nodes represent objects within given ontology and edges represent relations between those objects. Such graphs can be very complex even for medium sized ontologies so ...
详细信息
ISBN:
(纸本)9788360779026
Ontologies are often represented as a graph where nodes represent objects within given ontology and edges represent relations between those objects. Such graphs can be very complex even for medium sized ontologies so a clean and complete graphical representation is needed. Existing solutions do not include all elements or produce unreadable results for big ontologies. In this paper a complete set of graphical objects for ontology representation was proposed. Algorithms for graph creation were defined. An implementation of proposed solution is described. Comparison with other solutions is made.
In the regular of wireless network, conserving energy is important to extending the lifetime of mobile nodes and network. The goal of this paper is investigated the comparison of energy conservation between idle mode ...
详细信息
ISBN:
(纸本)9789746724913
In the regular of wireless network, conserving energy is important to extending the lifetime of mobile nodes and network. The goal of this paper is investigated the comparison of energy conservation between idle mode and power down mode based on the microcontroller. The LWM-433H wireless module is applied with the microcontroller. The operation of idle mode and power down mode are controlling the energy supply while the data transmission only. Based on experiment, the data transmission of wireless node is every 5 minutes, 15 minutes and 30 minutes at the transmission range is 65 meters. The time of each transmission successfully at 0.33 seconds that the frame size is 10 bytes, the battery is 12V2.6Ah. The result shows that the energy conservation of microcontroller in power down mode is more than idle mode by up to 14.59 percents, 14.64 percents and 14.65 percents, respectively. In addition, the battery lifetime in mobile node is 89.55 hours, 89.62 hours and 89.64 hours. The result can be explained, the power down mode that is stop the operation of an oscillator circuit while the idle mode closes the internal clock signal only. The result may be applied for some mobile application and support working with lifetime such as wireless mobile node, etc.
This paper analyses different aspects of S2S (system to system) migration, such as data conversion, procedures migration, and human factor. We present problems that may occur during the process, with particular emphas...
详细信息
ISBN:
(纸本)9788360779026
This paper analyses different aspects of S2S (system to system) migration, such as data conversion, procedures migration, and human factor. We present problems that may occur during the process, with particular emphasis on data migration issues. The latter part of the paper shows a connection between S2S migration and interoperability. Presented observations and conclusions are based on our experience gained while developing the e-University.
The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client's request comes to the system and the ...
详细信息
ISBN:
(纸本)9788360779026
The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client's request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces a multilayer authentication and authorization. Actor's privileges are the result of the user's and the system's roles conjunction with the network zone. Unlike common systems, the privileges are given to a digital identity, not to particular accounts, so that it does not matter which account was used by the user - he will get the same privileges. Such a combination of many smaller ideas and methods results in a new and modern approach to the security aspects of the distributed service oriented systems.
This paper presents a self-organizing adaptive fuzzy controller that works online. No prior knowledge about the differential equations governing the plant nor offline training is needed. Starting from very simple topo...
详细信息
A global network provides new opportunities for IT designers. It allows building applications from many pieces, known as components, distributed in different network locations. This methodology describes how to build ...
详细信息
ISBN:
(纸本)9788360779026
A global network provides new opportunities for IT designers. It allows building applications from many pieces, known as components, distributed in different network locations. This methodology describes how to build all system elements;business logic, data access and a presentation layer from the coarse-grained components. Such a possibility gives us the Java programming language and related open source technologies: Enterprise JavaBeans (EJB) for creating business components and Java Portlets for creating interface components. The presented approach shows how to manage relationships between components and their versions. It describes methods to ensure reliable and fast communication between them. The authors present platforms for building and testing automation of component based applications and explain how the component based approach could help to speed up the team work.
Despite the anecdotal animosity between Engineers and Lawyers, the attributes necessary for success in either profession are quite similar. These include the synthesis of information, making decisions when there are m...
详细信息
暂无评论