It is known that the OWL 2RL Web Ontology Language Profile has PTime data complexity and can be translated into Datalog. However, the result of translation may consist of a Datalog program and a set of constraints in ...
详细信息
This research analyses the development of a complex network in the swarm based Discrete Self-Organising Migrating Algorithm (DSOMA). The main aim is to evaluate if a complex network is generated in DSOMA, and how the ...
详细信息
This research deals with the initial investigations on the concept of a multi-chaos-driven evolutionary algorithm Differential Evolution (DE). This paper is aimed at the embedding and alternating of set of two discret...
详细信息
Snowden's whistleblower from the last year made people more aware of the fact that we are living in the Internet surveillance era. Privacy of Internet communication has been disrupted. In this paper, application f...
详细信息
Snowden's whistleblower from the last year made people more aware of the fact that we are living in the Internet surveillance era. Privacy of Internet communication has been disrupted. In this paper, application for privacy protection in chat communication, named CryptoCloak, is presented. CryptoCloak provides privacy protection for chat communication. Encrypted communication is masked with dynamic cheap chat conversation. Communication made this way is not point of interest for mass surveillance spying engines. For implementation of the CryptoCloak, Facebook Messenger API is used. Diffie-Hellman key exchange is done in clandestine manner - instead of sending uniform sequence of numbers, sentences are sent. Current version provides encryption/decryption mechanism for the chat communication using strong symmetric algorithm AES in CBC mode. 256 bits of Diffie-Hellman exchanged key are used for AES-CBC.
Vehicular Ad-hoc Networks (VANET) are employing heterogeneous technologies now a days to meet the increasing demands of Intelligent Transportation System (ITS) applications such as enriched multimedia, video conferenc...
详细信息
Vehicular Ad-hoc Networks (VANET) are employing heterogeneous technologies now a days to meet the increasing demands of Intelligent Transportation System (ITS) applications such as enriched multimedia, video conferencing, gaming and online collaboration. Deployment and maintenance cost for infrastructures are also a major concern. This work proposes a framework, capable of catering multiple technologies simultaneously (such as local area network, wide area networks and cellular networks), that deploys wired and wireless integrated technologies to exploit the advantages of both. Therefore, it offers the architecture based on radio over fiber technology to meet the future requirements of high data rate for Road Vehicle Communication (RVC) in VANETs and it comes up with the most important and perhaps desperately needed feature of ‘Future Technology Support’ yielding very high data rates support. Several traditionally deployed architectures are striving to come up with the future needs but due to their various limitations they were unable to attain their expected outcomes. The proposed RoF based architecture justifies its need inducing a true value and powerful features to dramatically enhance the overall performance of the entire system. Several evaluation parameters have been chosen that clearly present the strength of proposed RoF framework and prove that RoF framework is the better option for the service providers in the area of ITS applications.
In recent years, importance on software security technologies has been recognized and various types of technologies have been developed. On the other hand, in spite of recognition of necessity of providing cases that ...
详细信息
In recent years, importance on software security technologies has been recognized and various types of technologies have been developed. On the other hand, in spite of recognition of necessity of providing cases that deal with full life cycle for secure software development, only few are reported. This paper describes a case-based management system (CBMS) that consists of an artifact management system and a knowledge-based management system (KBMS) to manage cases for secure software development. The former manages the artifacts created in secure software life cycle. The latter manages software security knowledge. The case-based management system also manages association between artifacts and software security knowledge and supports both visualization among software security knowledge and between artifacts and software security knowledge. We conducted an experiment to evaluate the system. We describe the effectiveness and future work of the system.
The reduction of carbon emission is imperative towards the Green Internet. Hence, this paper proposes and validates green routing metrics focused on improving energy efficiency of multi-hop approaches in heterogeneous...
详细信息
ISBN:
(纸本)9781450332804
The reduction of carbon emission is imperative towards the Green Internet. Hence, this paper proposes and validates green routing metrics focused on improving energy efficiency of multi-hop approaches in heterogeneous wireless peoplecentric environments. The validation is carried out through discrete event simulations based on real data set traces and controlled random topologies for the specific case of AODV. Results show improvements to network lifetime without penalizing other performance metrics.
A common image forgery method is copy-move forgery (CMF), where part of an image is copied and moved to a new location. Identification of CMF can be conducted by detection of duplicated regions in the image. This pape...
详细信息
A common image forgery method is copy-move forgery (CMF), where part of an image is copied and moved to a new location. Identification of CMF can be conducted by detection of duplicated regions in the image. This paper presents a new approach for CMF detection where cellular automata (CA) are used. The main idea is to divide an image into overlapping blocks and use CA to learn a set of rules. Those rules appropriately describe the intensity changes in every block and are used as features for detection of duplicated areas in the image. Use of CA for image processing implies use of pixels' intensities as cell states, leading to a combinatorial explosion in the number of possible rules and subsets of those rules. Therefore, we propose a reduced description based on a proper binary representation using local binary patterns (LBPs). For detection of plain CMF, where no transformation of the copied area is applied, sufficient detection is accomplished by 1D CA. The main issue of the proposed method is its sensitivity to post-processing methods, such as the addition of noise or blurring. Coping with that is possible by pre-processing of the image using an averaging filter.
暂无评论