Fragmentation is the term given to the process of breaking down an IP datagram into smaller packets to be transmitted over different types of network media and then reassembling them at the other end. In most cases, d...
详细信息
ISBN:
(纸本)9781467329064
Fragmentation is the term given to the process of breaking down an IP datagram into smaller packets to be transmitted over different types of network media and then reassembling them at the other end. In most cases, depending upon the actual security device defending the network, there are typically multiple fragmentation techniques and packet size combinations capable of squeezing and exploiting protection device on a network. In this paper we present an efficient algorithm for regular expression matching on streams with fragmented and out of order data, while maintaining a small state and without complete stream reconstruction. It improves the performance of Intrusion Detection System for detecting the fragmented and Out-of-Order packet attack.
Maximum heart rate (MHR) is commonly used to estimate exercise intensity with the Karvonen formula, and there are several methods of calculating it. In this study, we used pedaling experiments on a cycle ergometer to ...
详细信息
ISBN:
(纸本)9789898565716
Maximum heart rate (MHR) is commonly used to estimate exercise intensity with the Karvonen formula, and there are several methods of calculating it. In this study, we used pedaling experiments on a cycle ergometer to evaluate methods of determining MHR in order to select the ones most suitable for the Karvonen formula. In the experiments, 43 subjects rode an aerobike. The results show that, for people in their 20s, two methods are suitable for estimating exercise intensity with the Karvonen formula. The main physical parameters affecting exercise intensity were also extracted, based on the experimental results.
Continued advances and cost reduction in personal mobile devices such as smart phones made them widely used in daily-life practices. Mobile devices can be integrated with a growing set of cheap powerful embedded senso...
详细信息
We propose a method of correcting phase distortion which is caused when measuring any objects by phase shifting method with an ordinary projector. We have measured some objects with the projector which is commercially...
详细信息
Because of distributed nature, grid computing environments are easy targets for intruders looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the intruders can use a service's a...
详细信息
This paper presents a mobile application based on providing Location Based Services (LBS) using Global Positioning System (GPS) as a location provider. The main objective of this work is to design and implement a clie...
详细信息
This paper presents a mobile application based on providing Location Based Services (LBS) using Global Positioning System (GPS) as a location provider. The main objective of this work is to design and implement a client server system that helps the system to know the location of their employees and also alerts the employee when they are nearby. The mobile application was implemented using J2ME where the most recent APIs and other older APIs were combined together in order to make the application reliable on all types of mobiles. The server was implemented using J2EE technologies. The type of the Database used in the system was MySQL. The average location accuracy of the application is about couple of meters.
Since around 2000, many companies have worked to create interorganizational cooperation, which can solve the problem of a lack of resources when creating new business. In the real world, many companies cannot find the...
Since around 2000, many companies have worked to create interorganizational cooperation, which can solve the problem of a lack of resources when creating new business. In the real world, many companies cannot find the holder of necessary resources, and they cannot conduct proper interor-ganizational cooperation. To solve these problems, we propose a business process visualization tool.
In Japan, since strong ties bind leading domestic semiconductor and user companies, a tendency exists under which the market accessibility of fabless semiconductor companies is blocked. Nevertheless, several fabless s...
详细信息
In Japan, since strong ties bind leading domestic semiconductor and user companies, a tendency exists under which the market accessibility of fabless semiconductor companies is blocked. Nevertheless, several fabless semiconductor companies have been successful to enter market. The following two market strategies have been seen these companies: specific user-based strategy and expanding user strategy. In this paper, we examine the strategy of these companies, and consider how to achieve high added value.
In this paper, we present an on-line electronic payment system for low-value transaction. We use the concept of signcryption for each communication between any pair of entities and offers token updation instantly as a...
详细信息
In this paper, we present an on-line electronic payment system for low-value transaction. We use the concept of signcryption for each communication between any pair of entities and offers token updation instantly as an add-on feature to existing on-line e-cash systems where token is the payment instrument (containing electronic cash) which acts as an electronic wallet. In our system, the token is issued and authenticated by Issuing Bank (token issuer). Merchant verifies the user and sends authenticated transaction details to Issuing Bank. Later Issuing Bank verifies approval of both customer and merchant. The merchant is also verified by its financial institution. Unlike the existing e-payment system question of double spending of e-cash arises because each transaction are made uniquely identifiable and updation is instantly done by Issuing bank. Hence no separate protocols are needed to be developed for handling disputes. The proposed scheme provide anonymity, authenticity, confidentiality and fairness.
Since around 2000, many companies have worked to create interorganizational cooperation, which can solve the problem of a lack of resources when creating new business. In the real world, many companies cannot find the...
详细信息
Since around 2000, many companies have worked to create interorganizational cooperation, which can solve the problem of a lack of resources when creating new business. In the real world, many companies cannot find the holder of necessary resources, and they cannot conduct proper interorganizational cooperation. To solve these problems, we propose a business process visualization tool.
暂无评论