Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2017
A Novel Approach for Image Steganography based on LSB Technique
ICCDA '17: Proceedings of the International Conference on Compute and Data AnalysisPages 167–170https://doi.org/10.1145/3093241.3093247Steganography involves communicating secret data in an appropriate digital carrier, e.g., image, audio, and video files. We focus on image based steganography in this paper. A novel approach based on LSB technique for embedding text data i.e. secret ...
- rfcJune 2016
RFC 7915: IP/ICMP Translation Algorithm
This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 6145.
- rfcSeptember 2015
RFC 7631: TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format
This document reorganizes the naming of already-allocated TLV (type- length-value) types and type extensions in the "Mobile Ad hoc NETwork (MANET) Parameters" registries defined by RFC 5444 to use names appropriately. It has no consequences in terms of ...
- articleMay 2014
Object oriented computing
The object oriented computing model is the prevailing programming paradigm of today; contemporary programming languages like Java or C# strictly require it-and thus the programmer has no other choice than object oriented computing. Object oriented ...
-
- ArticleJuly 2013
Study on effects of text decoration for a text based communication tool in education
HCI'13: Proceedings of the 15th international conference on Human-Computer Interaction: human-centred design approaches, methods, tools, and environments - Volume Part IPages 565–574https://doi.org/10.1007/978-3-642-39232-0_61In this paper, the authors have focused on effects of text decoration function on text based communication system in education. In recent years, chance of the text based communications between a teacher and students in face-to-face lessons has ...
- ArticleJuly 2012
An Approach for Process Variability Control in Business Process Management
TASE '12: Proceedings of the 2012 Sixth International Symposium on Theoretical Aspects of Software EngineeringPages 231–234https://doi.org/10.1109/TASE.2012.25To adapt to the demand of agile reengineering of business process in Business Process Management System, a kind of software model which based on message computing is proposed. Aiming at conducting varied modeling of the business process variation type ...
- ArticleJuly 2012
Message-Based Motivation Modeling
ICALT '12: Proceedings of the 2012 IEEE 12th International Conference on Advanced Learning TechnologiesPages 420–421https://doi.org/10.1109/ICALT.2012.81Social networks contain a multitude of messages that can be utilized to motivate learning. However, while some messages may increase a learner's motivation, other messages could undermine it. How can we tell which is which? Conceptual motivation models ...
- ArticleMay 2012
A Strategy for Data Consistency in Non-real-Time Connected DDBS
CSNT '12: Proceedings of the 2012 International Conference on Communication Systems and Network TechnologiesPages 813–814https://doi.org/10.1109/CSNT.2012.176Considering the expense, the security of communication and demand in practice, a strategy is proposed, which propagates replicated data based on message and transaction-log table to update and maintain the database. It emphasizes that updates to a ...
- rfcFebruary 2012
RFC 6518: Keying and Authentication for Routing Protocols (KARP) Design Guidelines
This document is one of a series concerned with defining a roadmap of protocol specification work for the use of modern cryptographic mechanisms and algorithms for message authentication in routing protocols. In particular, it defines the framework for a ...
- ArticleSeptember 2011
Expressive Audiovisual Message Presenter for Mobile Devices
NGMAST '11: Proceedings of the 2011 Fifth International Conference on Next Generation Mobile Applications, Services and TechnologiesPages 25–28https://doi.org/10.1109/NGMAST.2011.15This document presents the development of an extension to the SMS Service for Android smart phones, which adds audio and visual characteristics to this widely used communication service. With this solution, when a SMS message is received, it is read by ...
- ArticleAugust 2011
Moral hazard resolved in communication for S4n-logic: cyclic communication network case
This paper investigates the role of communication among the principal and agents under uncertainty. We treat the problem: How epistemic conditions of communication will be able to settle a moral hazard in team in the principal-agent model under ...
- ArticleApril 2011
Secure SMS communications for M-learning services
Education processes have evolved in the last decades by integrating new technology. The m-learning field has been defined new educational services that deliver knowledge and content on mobile devices, highlighting a dreamed educational concept, anywhere,...
- rfcApril 2011
RFC 6145: IP/ICMP Translation Algorithm
This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 2765. [STANDARDS-TRACK]
- articleOctober 2010
Information and communication activity, its essence, structure, and types
Automatic Documentation and Mathematical Linguistics (SPADML), Volume 44, Issue 5Pages 246–248https://doi.org/10.3103/S000510551005002XThe problem of defining the primary forms of information objects is considered. It is proposed to include messages, algorithms, and models in this class.
- ArticleSeptember 2009
Research of RFID middleware publish/subscribe mechanism based on SOA
WiCOM'09: Proceedings of the 5th International Conference on Wireless communications, networking and mobile computingPages 3735–3739In large-scale RFID applications, RFID middleware has played a very important role. Most popular RFID middleware serves as RFID reader manager, data processing center, data distribution and subscription server, which means all work is done by one ...
- ArticleAugust 2009
OverFly-A Client-Enhanced Publish-Subscribe System
GCC '09: Proceedings of the 2009 Eighth International Conference on Grid and Cooperative ComputingPages 232–237https://doi.org/10.1109/GCC.2009.27This paper presents OverFly, a large-scale publish-subscribe system developed to support our grid middleware, Vega Grid Operating System, short as GOS. OverFly differs from most existing publish-subscribe systems in three ways. First, it introduces a ...
- ArticleJune 2009
New matrix-sets generation and the cryptosystems
ECC'09: Proceedings of the 3rd international conference on European computing conferencePages 253–255The aim of this paper is to give the new generation of the sets of n × n matrices, which are isomorphic to Galois Field GF(2n). The order of primitive matrices of a multiplicative group is e = 2n -1. On that ground the matrix- key exchange algorithm via ...
- ArticleMay 2009
Research on the Controller Area Network
ICNDS '09: Proceedings of the 2009 International Conference on Networking and Digital Society - Volume 02Pages 251–254https://doi.org/10.1109/ICNDS.2009.142A controller area network (CAN) is ideally suited to the many high-level industrial protocols embracing CAN and ISO 11898 as their physical layer. Its cost, performance, and upgradeability provide for tremendous flexibility in system design. This paper ...
- articleMay 2009
Encrypting messages with visual key
This paper presents a method for encrypting messages, which uses for this operation an image or a part of an image as an encryption/decryption key. The need to encrypt messages for protecting their content knew an increase from the apparition of ...