Multicasting is one of the relevant issues of communication in infrastructure or centralized administration networks. The reliable delivery of multicast data packets needs feedback from all multicast receivers to indi...
详细信息
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p...
详细信息
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the privacy information and documents in the Internet, in this paper, we propose the idea of combining the three security methods of multilevel security, identity-based encryption (IBE), and distributed hash table (DHT) network. And we further propose an IBE-based secure self-destruction (ISS) scheme to protect the confidentiality and privacy of the Internet content by self-destruction after a predefined time. In our proposed ISS security scheme, the Internet content is first partitioned into many segments with diverse security levels, and each segment is encrypted with a symmetric key to obtain primitive ciphertext. By applying the methods of association and extraction, the primitive ciphertext is turned to associated ciphertext, which is then divided into extracted ciphertext and encapsulated ciphertext. The latter is encapsulated into the Internet content self-destructing object (CDO), which is stored into the storage services provider. Furthermore, to protect the privacy security when the CDO expired, the symmetric key is encrypted using the IBE algorithm based on the identity of the authorized user. The combination of this key's ciphertext and the extracted ciphertext, by means of Lagrange polynomial processing, generates mixture ciphertext shares. Then those shares are distributed into nodes within the DHT network and will be automatically discarded over the deadline when the primitive ciphertext and the symmtric key are unrecoverable. Consequently, the ISS scheme achieves the aim of secure self-destruction. Comprehensive analysis shows that the ISS scheme is able to satisfy all the design demands and is more secure than existing schemes. The ISS scheme can resist against not only the traditional cryptanalysis and brute-force attack, but also the Sybil
In this study, we performed an experiment for examining an advanced line-of-sight measurement method in human face-to-face communication to investigate eye-contact measurement method that supports mental health care. ...
详细信息
In this study, we performed an experiment for examining an advanced line-of-sight measurement method in human face-to-face communication to investigate eye-contact measurement method that supports mental health care. In this experiment, an acrylic board was arranged between two talkers as a virtual display, and the gaze points were analyzed in order to examine the effects of the presence of the acrylic board on the talkers. The result demonstrated that the talkers' lines of sight were focused on the acrylic board.
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe ch...
详细信息
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computersystem and then use this information to secure the network. In this context, signature-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities. Signature-based detection is the most extensively used threat detection technique for (IDSs). One of the foremost challenges for signature-based IDSs is how to keep up with large volume of incoming traffic when each packet needs to be compared with every signature in the database. When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential attacks. This paper proposes a new model called Signature-based Multi-Layer IDS using mobile agents, which can detect imminent threats with extremely high success rate by dynamically and automatically creating and using small and efficient multiple databases, and at the same time, provide mechanism to update these small signature databases at regular intervals using mobile agents.
Mining of least association rules from large databases has received a great attention in knowledge discovery. These rules are very useful especially in tracing the unexceptional events or situations. Until this moment...
详细信息
Nowadays, rapid technological progress influences the dependability of equipments and also causes rapid obsolescence. The mechatronic and electronic equipment components are mostly affected by obsolescence. A new chal...
详细信息
Nowadays, rapid technological progress influences the dependability of equipments and also causes rapid obsolescence. The mechatronic and electronic equipment components are mostly affected by obsolescence. A new challenger unit possesses identical functionalities, but with higher performances. This work aims to find the optimal number of components which should be replaced by new-type units, under budgetary constraints. In this work, the new challenger unit is characterized by lower energy consumption and the optimization steps are based on genetic algorithm (GA). The result shows the importance of this type of replacement in order to economize energy consumption and to deal with obsolescence.
This study is concerned with a fundamental issue of time series representation for modeling and prediction with Fuzzy Cognitive Maps. We introduce two distinct time series representation schemes for Fuzzy Cognitive Ma...
This study is concerned with a fundamental issue of time series representation for modeling and prediction with Fuzzy Cognitive Maps. We introduce two distinct time series representation schemes for Fuzzy Cognitive Map design. First method is based on time series amplitude, amplitude change, and change of amplitude change (dynamics perspective). Second scheme is based on three consecutive historical observations: present value, past value and before past value (history perspective). Introduced procedures are experimentally verified and compared on several synthetic and real-world time series of various characteristics. The history-oriented time series representation turned out to be more advantageous. Quality of FCM-based time series models and one-step-ahead predictions were measured in terms of Mean Squared Error. We have shown that models designed with history-oriented time series representation generally require less FCM nodes to be of comparable quality as models built on dynamics-oriented time series representation. As a result, with the history-oriented time series representation scheme we are able to construct simpler and therefore better models.
The paper is focused on man-machine communication, which is perceived in terms of data exchange. Understanding of data being exchanged is the fundamental property of intelligent communication. The main objective of th...
The paper is focused on man-machine communication, which is perceived in terms of data exchange. Understanding of data being exchanged is the fundamental property of intelligent communication. The main objective of this paper is to introduce the paradigm of intelligent data understanding. The paradigm stems from syntactic and semantic characterization of data and is soundly based on the paradigm of granular structuring of data and computation. The paper does not introduce a formal theory of intelligent data understanding. Instead this paradigm as well as notions of granularity, semantics and syntax are cast on the domain of music information. The domain immersion is forced by heavy dependence of details of the paradigm of automatic data understanding on application in a given domain.
Microwave application technologies such as microwave heating, microwave assisted chemistry, etc. are of the innovative green technologies. This paper proposes a chip-size structure for continuous microwave irradiation...
详细信息
Recently, an information-based saliency technique which is biologically plausible and computationally feasible called Discriminant Saliency (DIS) has been proposed. While DIS successfully defines discriminant saliency...
详细信息
暂无评论