Wireless sensor networks (WSN) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power suppl...
详细信息
Wireless sensor networks (WSN) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power supplies for sensors in the network are not usually rechargeable or replaceable. Therefore, the energy efficiency is critical for the lifetime and cost of WSN. Numerous mechanisms have been proposed to reduce the impact of communication protocols on the overall energy dissipation of WSN. The low-energy adaptive clustering hierarchy (LEACH) deploys randomized rotation of cluster-heads to evenly distribute the energy load among all sensors in a WSN. This paper proposes an improved LEACH algorithm called partition-based LEACH (pLEACH), which firstly partitions the network into optimal number of sectors, and then selects the node with the highest energy as the head for each sector, using the centralized calculations. The simulation results and analysis show that pLEACH could achieve much better performance of WSN in terms of the energy dissipation and network lifetime.
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin...
详细信息
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to higher learning institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI information technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next ...
详细信息
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next to it. We perform experiments on uniformly distributed random datasets to compare our algorithm with the standard SvS. We use regression analysis to get an equation for determining an appropriate skipping number. Our results show that the skipping SvS algorithm using the equation obtained can reduce approximately 41% on the number of comparisons of the standard SvS algorithm.
In this paper, we propose a novel approach for recognizing facial expressions based on using an active appearance model facial feature tracking system with the quadratic deformation model representations of facial exp...
详细信息
In this paper, we propose a novel approach for recognizing facial expressions based on using an active appearance model facial feature tracking system with the quadratic deformation model representations of facial expressions. Thirty seven facial feature points are tracked based on the MPEG-4 facial animation parameters layout. The proposed approach relies on the Euclidean distance measures between the tracked feature points and the reference deformed facial feature points of the six main expressions (smile, sad, fear, disgust, surprise, and anger). An evaluation of 30 model subjects, selected randomly from the Cohn-Kanade database, was carried out. Results show that the main six facial expressions can successfully be recognized with an overall recognition accuracy of 89%. The proposed approach yields to promising recognition rates and can be used in real time applications.
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague a...
详细信息
ISBN:
(纸本)9780769537443
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modif...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modified *** propose a novel approach of substitution technique of audio *** genetic algorithm,message bits are embedded into multiple,vague and higher LSB layers,resulting in increased *** robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Unlike conventional automatic continuous speech segmentation models that deal with each boundary time-mark individually, in this paper, we propose an interval-data-based linear regression model for syllable nucleus du...
详细信息
Unlike conventional automatic continuous speech segmentation models that deal with each boundary time-mark individually, in this paper, we propose an interval-data-based linear regression model for syllable nucleus durations estimation (LRM-DE), which treats syllable boundary time-marks in pairs. This characteristic of LRM-DE makes it more suitable for estimating syllable durations for English sentences, which can be used for sentence stress detection. LRM-DE combines the outcomes of multiple base automatic speech segmentation machines (ASMs) to generate final boundary time-marks that miminize the average distance of the predicted and reference boundary-pairs of syllable nuclei. Experimental results show that on TIMIT dataset, LRM-DE reduces the average difference between the predicted syllable nucleus durations and their reference ones from 13.64 ms (the best result of a single ASM) to 11.81 ms. Also, LRM-DE improves the syllable nucleus segmentation accuracy from 81.59% to 83.98% within a tolerance of 20 ms.
In recent years the focus of grid computing shifted towards more data intensive applications, increasingly needing access to various public and private databases. Relocating the code for Data Preprocessing (DPP) close...
详细信息
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and a...
详细信息
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and are not available for use. Through a survey on the needs for CSCL in Malaysia, it is confirmed that CSCL application is needed but the available one could not support CL activities. This paper discusses CSCL study in Malaysia, especially the relationship between user involvement and type of CSCL application needed. In particular, the CSCL application that could associate existing knowledge among students to build new knowledge for their better understanding and problem solving skills. We examine this need and assess its impact by developing Collaborative Environment for Teaching and Learning System (CETLs).
暂无评论