Although there are many voice systems that can act as user interfaces for visually impaired people, there is still a problem with explaining more complicated structures to these users (such as mathematical equations, ...
详细信息
The current system of issuing and validating Subscriber Identity modules (SIM) is very manual, where the identity documents are taken into the physical format, which can be misused and give a treat of identity detail ...
详细信息
ISBN:
(纸本)9781479939251
The current system of issuing and validating Subscriber Identity modules (SIM) is very manual, where the identity documents are taken into the physical format, which can be misused and give a treat of identity detail compromise. Their could be collision between sim issuer vendor and radical elements. The two basic problems, cross reference validation, and identity document protection is handled in the proposed work. In order to have cross reference validation a process of one time token generation is proposed and images split and merge mechanism for identity document protection. Concept of webservices, GSM modem is used while real time tested implementation. A proposed mechanism provides satisfactory results in term of validating the stages of mechanism and it can recommended to be adopted in the real time scenario.
In this paper, we argue that a broad range of Internet-scale distributed applications can benefit from an underlying low-cost consistency detection framework that is an alternative to inconsistency avoidance and can d...
详细信息
Multiplications over the Galois field GF $(2^{m})$ are widely used for the realization of point operations in the elliptic curve cryptosystem (ECC). Implementation of these multipliers for resource-constrained applica...
详细信息
Domain testing is a well-known software testing technique. Although research tasks have been initiated in domain testing, automatic test data generation based on character string predicates has not yet been reported. ...
详细信息
The security of database is more and more concerned. There are several traditional methods to protect the information of databases, such as encryption and authentication. However, these methods are not appropriate for...
详细信息
ISBN:
(纸本)1601320485
The security of database is more and more concerned. There are several traditional methods to protect the information of databases, such as encryption and authentication. However, these methods are not appropriate for all the situations because of the performance. This paper proposed a new method to prevent the information leakage of traditional databases, and this idea is totally different from the traditional ones. We can change the semantic meanings of relational data by reordering them. By this way, we can prevent the information from leakage. Some users with low privileges will only get the meaningless data, while they do not realize that themselves. In many cases, this method meets the requirements of security while it influences a little on the system performance.
This paper presents a methodology for analyzing quantum information systems, based on model checking;particularly we are interested in the protocol of quantum key distribution B92. It has been proved that this protoco...
详细信息
Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and over again. Web programmers are facin...
详细信息
ISBN:
(纸本)3939352055
Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and over again. Web programmers are facing limitations on code reuse, application and framework integration, extensibility, expressiveness of programming model and productivity. In this paper we propose a minimalistic component model Aranea that is aimed at constructing and integrating server-side web controller frameworks in Java. It allows assembling most of available web programming models out of reusable components and patterns. We also show how to integrate different existing frameworks using Aranea as a common protocol. In its default configuration Aranea supports both developing sophisticated user interfaces using stateful components and nested processes as well as high-performance stateless components. We propose to use this model as a platform for framework development, integration and research. This would allow combining different ideas and avoid reimplementing the same features repeatedly. An open source implementation of Aranea framework together with reusable controls, such as input forms and data lists, and a rendering engine are ready for real-life applications. Copyright 2006 ACM.
Neural Radiance Fields (NeRFs) are a novel approach that is being intensively investigated in 3D scene reconstruction and similar fields to overcome challenges of conventional methods. In this paper, we address the pr...
详细信息
暂无评论