A wide range of steganography techniques has been described in this literature. Our paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techni...
详细信息
ISBN:
(纸本)9781615676576
A wide range of steganography techniques has been described in this literature. Our paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techniques of digital audio steganography algorithms. Here, beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of Substitution Techniques are investigated which if they could be solved, the large capacity - strength- of Substitution Techniques would be practical.
The PSP-Expert Visualization Agent (EVA) is designed for software engineers specifically to introduce the agent-oriented concept, as well as to automate all the processes and fields involved in PSP. Currently, some de...
详细信息
This paper proposes improving the usability of HTA (Hierarchical Task Analysis) chart through redefinition. The plans in the existing HTA chart (HTAe) are replaced with symbols giving a proposed representation of HTA ...
详细信息
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considering the active role of agents in them. Th...
详细信息
One of the debatable issues in programming courses for core computer Science (CS) and Information technology (IT) education is on how to improve the assessment so that it will reflect student's programming skills....
详细信息
ISBN:
(纸本)9780889867901
One of the debatable issues in programming courses for core computer Science (CS) and Information technology (IT) education is on how to improve the assessment so that it will reflect student's programming skills. This research will focus on this issue by proposing a new model to support the assessment of programming courses, specifically in object-oriented programming. The model will be developed by identifying object oriented concepts that student's have applied in their program source code using object oriented metrics. Metrics are an important technique in quantifying desirable software and software development characteristics of object oriented software development. Currently, metrics proposed for OO software development have rarely been used to support assessment process. This paper will investigate the suitable object-oriented metrics to be applied in the process of developing the assessment model for object-oriented programming courses. We give an overview on the object-oriented metrics and the necessary steps on the applications of metrics towards development of the assessment model.
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the c...
详细信息
ISBN:
(纸本)9781601321190
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the correct recognized samples and the number of all possible samples. This paper proposes a new technique to improve the previous research work in order to have a better result. As part of the preprocessing phase the image file is checked for skewing. If the image is skewed, it is corrected by a simple rotation technique in the appropriate direction. Character fragmentation process is done based on the existing technique. The improvement of feature extraction process is made by detecting details of glyph and used as an input for the classification process of ANN (Artificial Neural Network) to develop a full OCR system. Result indicated that some versions, even upon first using them, were at least as good as last methods of recognition.
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exi...
详细信息
ISBN:
(纸本)9780982148914
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exist in Information Systems (IS) in one of government supported hospital in Malaysia. The hospital has been equipped for a Total Hospital Information System (THIS). The data collected were from three different departments using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows that the most critical threat for the THIS is the power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a comprehensive list of potential threat categories in IS and subsequently taking the results of this step as input for the risk mitigation strategy. Keywords: Healthcare Information Systems (HIS), Information Systems (IS), Risk Analysis, Threats
Business Process Modeling (BPM) is the first and most important step in business process management lifecycle. Graph based formalism and rule based formalism are the two most predominant formalisms on which process mo...
详细信息
As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However...
详细信息
In recent years the focus of grid computing shifted towards more data intensive applications, increasingly needing access to various public and private databases. Relocating the code for Data Preprocessing (DPP) close...
详细信息
暂无评论