55 Hits in 7.3 sec

A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing

Raya Basil Alothman, Imad Ibraheem Saada, Basma Salim Bazel Al-Brge
2022 Journal of Cases on Information Technology  
Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images.  ...  When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system.  ...  Cloud computing has expanded over the last couple of years into our lives as a new model for a vast number of business applications.  ... 
doi:10.4018/jcit.20220101.oa1 fatcat:fhync46p2fdgngbaqkiqykmsoa

Examination and Assessment of Different Cryptographic Technique based on a Variety of Features

Cloud computing provides an administrations such as programming bundle stockpiling, internetwork and equipment these assortments of administrations are given to client.  ...  Inside the development encryption it consolidates 2 very surprising calculations for giving the higher security.  ...  RC2 and RC5: Ronald Rivest (RSA Labs) built encryption calculations with variable square and key sizes.  ... 
doi:10.35940/ijitee.i7813.0881019 fatcat:rfwq3ykmlvaalpo3mzyhz2drve

Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization [article]

Mikael Fernandus Simalango, Mun-Young Kang, Sangyoon Oh
2010 arXiv   pre-print
Cloud computing is penetrating into various domains and environments, from theoretical computer science to economy, from marketing hype to educational curriculum and from R&D lab to enterprise IT infrastructure  ...  We then suggest a strategic framework for designing a high performance cloud system. This framework is applicable when transformation cloudbased deployment model collides with some constraints.  ...  Some groundbreaking work includes Blue Eyes [45] , a system management in the cloud, and IBM's global testbed for compute cloud, which is named after RC2 [46] .  ... 
arXiv:1010.4952v1 fatcat:et6ayvzy4fcujdug23fe6l4qo4

Mobile computing

Mahadev Satyanarayanan
2011 ACM SIGMOBILE Mobile Computing and Communications Review  
Mobile computing has arrived as a lucrative business proposition. Looking ahead, what are the dreams that will inspire our future efforts in mobile computing?  ...  At that time, the goal of "information at your fingertips anywhere, anytime" was only a dream.  ...  The recent emergence of cloud computing suggests the possibility of leveraging infrastructure such as Amazon's EC2 cloud or IBM's RC2 cloud for cyber foraging.  ... 
doi:10.1145/2016598.2016600 fatcat:4t7tlphocbcmhcohuaqwrh4msi

A user-centric evaluation of context-aware recommendations for a mobile news service

Toon De Pessemier, Cédric Courtois, Kris Vanhecke, Kristin Van Damme, Luc Martens, Lieven De Marez
2015 Multimedia tools and applications  
Considering the recommendations based on the static profile as a reference condition, the results indicate a significant improvement for recommendations that are based on the actual user behavior.  ...  However, in many applications, this contextual information may be relevant for the human decision process, and as a result, be important to incorporate into the recommendation process, which gave rise  ...  Stream Store is a project cofunded by iMinds (Interdisciplinary institute for Technology) a research institute founded by the Flemish Government.  ... 
doi:10.1007/s11042-014-2437-9 fatcat:gad7m2zevje65ppluiorvuip34

High-Resolution Vertical Habitat Mapping of a Deep-Sea Cliff Offshore Greenland

Loïc Van Audenhaege, Emmeline Broad, Katharine R. Hendry, Veerle A. I. Huvenne
2021 Frontiers in Marine Science  
Navigational accuracy was improved through a combination of the USBL and the DVL navigation of the ROV. Multi-scale terrain descriptors were derived and assigned to the 3D point cloud of the terrain.  ...  Using a forward-looking set-up on a Remotely Operated Vehicle (ROV), a high-resolution multibeam echosounder was used to map out the topography of the deep-sea terrain, including, for the first time, the  ...  We would like to thank Katleen Robert who provided R scripts for preprocessing and Evan Edinger for reviewing the initial version of our work.  ... 
doi:10.3389/fmars.2021.669372 fatcat:zxff3ignn5hw7coggy5eluqrim

Action-Oriented Programming Model: Collective Executions and Interactions in the Fog

Niko Mäkitalo, Timo Aaltonen, Mikko Raatikainen, Aleksandr Ometov, Sergey Andreev, Yevgeni Koucheryavy, Tommi Mikkonen
2019 Journal of Systems and Software  
the Internet of Things (IoT) is a Cloud-based system, where devices transfer their data to a back-end and in return receive instructions on how to act.  ...  Highlights • The paper introduces six qualities for human-centric Fog Computing • The qualities help improving how humans experience multi-device computing • Based on the qualities, we redesign our Action-Oriented  ...  We developed and tested this solution first in lab environment [43] and later in a live cellular core by showing the possibility of maintaining the coalitions on the fly [44] .  ... 
doi:10.1016/j.jss.2019.110391 fatcat:6zzdwhk76rhwhnkvjmhkdw5b24

Managing to release early, often and on time in the OpenStack software ecosystem

José Apolinário Teixeira, Helena Karsten
2019 Journal of Internet Services and Applications  
In this longitudinal case study, we address the release management practices of OpenStack, a large scale open source project developing cloud computing technologies.  ...  It is already known that most open source software communities adopt either a feature-based or time-based release strategy.  ...  We are very grateful to the overall OpenStack community for developing an open, transparent and inclusive cloud computing infrastructure for big-data while being friendly towards academic research.  ... 
doi:10.1186/s13174-019-0105-z fatcat:wd3edkahpragdpku5sl64pzb6i

Usage of Artificial Intelligence to Improve Secure Software Development

Ahmet EFE
2021 Journal of International Scientific Researches  
Main method for the situation is mainly using the machine learning techniques to analyze the source code and determine the security level of a source code.  ...  It has the ninth in Github, and it would cause a great impact in .NET.  ...  Here we selected a few of them for our analysis: Deep Learning for Secure Mobile Computing Review At that passage, we have inspected the paper, Deep Learning for Secure Mobile Edge Computing, Yuanfang  ... 
doi:10.23834/isrjournal.824662 fatcat:dcohk43h2rd7jg5olkzbmko7ku

Secure Image Hiding Algorithm using Cryptography and Steganography

Hemlata Sharma
2013 IOSR Journal of Computer Engineering  
secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms.  ...  internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for  ...  We are also very thankful for valuable work of Rupali Mankar, Amruta Fawde, Rupesh Rathod, Ajinkya Deshmukh and Niraj Yeotikar who created a firm platform for us.  ... 
doi:10.9790/0661-1350106 fatcat:ufv3vx7pd5banok7b5eh7bup7y

Resilient Edge: Can we achieve Network Resiliency at the IoT Edge using LPWAN and WiFi? [article]

Vijay Kumar and Poonam Yadav and Leandro Soares Indrusiak
2022 arXiv   pre-print
Edge computing has gained attention in recent years due to the adoption of many Internet of Things (IoT) applications in domestic, industrial and wild settings.  ...  We (i) present the network resiliency requirements of IoT applications by defining a system model (ii) analyse and evaluate the bandwidth, latency, throughput, maximum packet size of many state-of-the-art  ...  on a cloud.  ... 
arXiv:2205.03729v1 fatcat:bv4x2lpzzfhu7gn4ays2jqrqzy

DROWN: Breaking TLS Using SSLv2

Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney (+3 others)
2016 USENIX Security Symposium  
For an even cheaper attack, we apply our new techniques together with a newly discovered vulnerability in OpenSSL that was present in releases from 1998 to early 2015.  ...  We implemented the attack and can decrypt a TLS 1.2 handshake using 2048bit RSA in under 8 hours, at a cost of $440 on Amazon EC2.  ...  for insights about TLS False Start, the OpenSSL team for their help with disclosure, Ivan Ristic for comments on session resumption in a BEAST-styled attack, and Tibor Jager and Christian Mainka for further  ... 
dblp:conf/uss/AviramSSHDSVAHD16 fatcat:cqhsavq3oncxpmi4zohqfvw6de

Experimental Evaluation of the Usage of Ad Hoc Networks as Stubs for Multiservice Networks

Miguel Almeida, Rafael Sarrô, JoãoPaulo Barraca, Susana Sargento, Rui L Aguiar
2007 EURASIP Journal on Wireless Communications and Networking  
The performance results obtained in the different real scenarios may question the real usage of ad-hoc networks for more than a minimal number of hops with such a large number of functionalities deployed  ...  This paper describes an experimental evaluation of a multiservice ad hoc network, aimed to be interconnected with an infrastructure, operator-managed network.  ...  RC2 stack, and a customised version of MACKILL [43] , for testing purposes.  ... 
doi:10.1155/2007/62967 fatcat:ur5l7k4j4rekzecowt7rxuspwm

No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large [article]

Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber
2015 arXiv   pre-print
We draw a comprehensive picture of the current state of every e-mail related TLS configuration for the entire IPv4 range.  ...  A well-positioned attacker may be able to intercept plaintext passively and at global scale.  ...  Thanks to Hanno Böck for discussion and feedback on Cryptography related subjects, RSA Weak-Keys and TLS.  ... 
arXiv:1510.08646v2 fatcat:pwqhszlhifeobboupn3nexcvle

The International Linear Collider Technical Design Report - Volume 3.I: Accelerator R&D in the Technical Design Phase [article]

Chris Adolphsen, Barry Barish, Philip Burrows (University of Oxford, Particle Physics Department), John Carwardine, Jeffrey Clark, Gerry Dugan (Cornell University), Eckhard Elsen, Brian Foster, Rongli Geng , Mike Harrison, Kiyoshi Kubo , Shinichiro Michizono , Mark Palmer, Thomas Peterson, Marc Ross (+4 others)
2013 arXiv   pre-print
The TDR also gives baseline documentation for two high-performance detectors that can share the ILC luminosity by being moved into and out of the beam line in a "push-pull" configuration.  ...  They form the basis for a world-class experimental programme that promises to increase significantly our understanding of the fundamental processes that govern the evolution of the Universe.  ...  on a timescale of hundreds of nanoseconds, there is a hint of a long-lived cloud with lifetime of many microseconds, possibly trapped in quadrupole and/or wiggler fields.  ... 
arXiv:1306.6353v1 fatcat:wt2xde5hzfc6xfx6qp2pb7jnby
« Previous Showing results 1 — 15 out of 55 results