This paper describes the CDRAS (Call Detail Records Analysis System) system, the motivation behind it, its approach and its background. The system aims at dealing with the notorious Man-in-the-Middle attack in the con...
详细信息
This paper describes the CDRAS (Call Detail Records Analysis System) system, the motivation behind it, its approach and its background. The system aims at dealing with the notorious Man-in-the-Middle attack in the context of VoIP. As the use of such a system constitutes leads to an interference with the privacy of users, the most relevant legal aspects related to this work are also briefly discussed.
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h...
详细信息
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we have developed a new technology called "PAIH" (Public Address Information Hiding) which is a technology to overlay information such as position or destination on siren sound of urgent vehicles. Siren sound is allowed to degrade of sound quality, but PAIH is required to decode correct information from siren sound with pitch shift (Doppler effect) or under noisy environment.
The paper analyzed and model of a fault tolerant electromechanical controlled worm gear driven fuel shut off valve for aerospace application. The analysis is mainly on design a reduced order fractional controller. Thi...
详细信息
The paper analyzed and model of a fault tolerant electromechanical controlled worm gear driven fuel shut off valve for aerospace application. The analysis is mainly on design a reduced order fractional controller. This is for controlling the velocity of worm gear so that the friction torque due to uneven rotational speed can be avoided. Because with the friction and stiction and backlash the valve system performance is reduced and more and more unstable this leads the system to failure. The proposed controller can provide robustness against the uncertain loading torque and system parameter.
In 2D animation processes, many simulated the movement and the deformation of a moving deformable object simultaneously. The binding of the movement and the deformation increased the complexity and restricted user'...
详细信息
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to p...
详细信息
Due to the advancement of digital media, a large number of electronic books are digitized from old paper books through digital cameras or scanners. The scanned image often contains the distractions such as noises outs...
详细信息
The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Pr...
详细信息
This paper describes how, in large-scale multi-agent systems, each agent's adaptive selection of peer agents for collaborative tasks affects the overall performance and how this performance varies with the workloa...
详细信息
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to p...
详细信息
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to provide efficient end-to-end communication. Due to the diverse applications that use MANETs, such as battlefield, emergency services, and disaster discovery, MANETs offer many advantages to many organizations that need wireless roaming. For efficient and timely use, routing and synchronization are essential. Both are hot research topics in MANETs. This paper concentrates on routing, which is a challenging task and has seen a huge number of different strategies proposed, each claiming to provide an improvement over other strategies. These competing strategies make it quite difficult to determine which one may perform optimally under a number of different sets of network conditions as defined by their Quality of Service (QoS) offerings. This paper reviews some of the state-of-the-art and widely investigated MANET routing strategies in the literature. Moreover, a performance comparison of discussed routing protocol strategies is provided and suggestions are made to achieve improvement in performance of these protocols. This research is followed by presenting further research that will be pursued to define a radically most optimum set of strategies to satisfy different types of application domains.
This paper presents an approach to determine the impact on throughput on airport resources in relation with operating procedures at airports. Due to time and cost constraints, identification of shortages on airport re...
详细信息
ISBN:
(纸本)9781617823169
This paper presents an approach to determine the impact on throughput on airport resources in relation with operating procedures at airports. Due to time and cost constraints, identification of shortages on airport resources is not a trivial task. Identification and elimination of shortages at airports deals with discovering dependencies within a sequence of actions, and with the dependencies through which the different components are conditional with their related actions. Identifying of shortages at airports is of great value due to its immense impact in determining the throughput on airport resources depending on the overall operation of the airport.
暂无评论