Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "LoG" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Access Logs : Underestimated Privacy Risks
Autorzy:
Glet, Michał
Kaczyński, Kamil
Powiązania:
https://bibliotekanauki.pl/articles/227087.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
metadata
privacy
cybersecurity
instant messaging
access log
Opis:
Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 405-410
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secure And Efficient Encryption Scheme Based on Bilinear Mapping
Autorzy:
Verma, Vandani
Mishra, Pragya
Powiązania:
https://bibliotekanauki.pl/articles/2124750.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
bilinear mapping
encryption
KGC
ID-OWE
discrete log problem
Opis:
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 3; 469--473
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Recognition of Sign Language from High Resolution Images Using Adaptive Feature Extraction and Classification
Autorzy:
Csóka, Filip
Polec, Jaroslav
Csóka, Tibor
Kačur, Juraj
Powiązania:
https://bibliotekanauki.pl/articles/226004.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
sign language
gesture
sign
recognition
CNN
LoG
real-time
pattern recognition
machine learning
Opis:
A variety of algorithms allows gesture recognition in video sequences. Alleviating the need for interpreters is of interest to hearing impaired people, since it allows a great degree of self-sufficiency in communicating their intent to the non-sign language speakers without the need for interpreters. State-of-the-art in currently used algorithms in this domain is capable of either real-time recognition of sign language in low resolution videos or non-real-time recognition in high-resolution videos. This paper proposes a novel approach to real-time recognition of fingerspelling alphabet letters of American Sign Language (ASL) in ultra-high-resolution (UHD) video sequences. The proposed approach is based on adaptive Laplacian of Gaussian (LoG) filtering with local extrema detection using Features from Accelerated Segment Test (FAST) algorithm classified by a Convolutional Neural Network (CNN). The recognition rate of our algorithm was verified on real-life data.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 303-308
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wireless Sensor Node Localization based on LNSM and Hybrid TLBO : Unilateral technique for Outdoor Location
Autorzy:
Kaundal, V.
Sharma, P.
Prateek, M.
Powiązania:
https://bibliotekanauki.pl/articles/226010.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
log normal shadowing model (LNSM)
teacher learning based optimization (TLBO)
trilateration
unilateral
RSSI
ZigBee
wireless sensor network
Opis:
The paper aims at localization of the anchor node (fixed node) by pursuit nodes (movable node) in outdoor location. Two methods are studied for node localization. The first method is based on LNSM (Log Normal Shadowing Model) technique to localize the anchor node and the second method is based on Hybrid TLBO (Teacher Learning Based Optimization Algorithm) - Unilateral technique. In the first approach the ZigBee protocol has been used to localize the node, which uses RSSI (Received Signal Strength Indicator) values in dBm. LNSM technique is implemented in the self-designed hardware node and localization is studied for Outdoor location. The statistical analysis using RMSE (root mean square error) for outdoor location is done and distance error found to be 35 mtrs. The same outdoor location has been used and statistical analysis is done for localization of nodes using Hybrid TLBO-Unilateral technique. The Hybrid-TLBO Unilateral technique significantly localizes anchor node with distance error of 0.7 mtrs. The RSSI values obtained are normally distributed and standard deviation in RSSI value is observed as 1.01 for outdoor location. The node becomes 100% discoverable after using hybrid TLBO- Unilateral technique.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 4; 389-397
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies