1,132 research outputs found
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
‘The language is disgusting and they refer to my disability’: the cyberharassment of disabled people
Disabled people face hostility and harassment in their sociocultural environment. The use of electronic-communications creates an online context that further reshape this discrimination. We explored the experiences of 19 disabled victims of cyberharassment. Five themes emerged from the study: disability and health consequences, family involvement, misrepresentation of self, perceived complexity, and lack of awareness and expertise. Cyberharassment incidents against disabled people were influenced by the pre-existing impairment, perceived hate-targeting, and perpetrators faking disability to get closer to victims online. Our findings highlight a growing issue requiring action and proper support
Analytical calculation of the longitudinal space charge and resistive wall impedances in a smooth cylindrical pipe
Chondromyxoid fibroma management: a single institution experience of 22 cases
Background: Several different strategies have been reported for the treatment of chondromyxoid fibromas, all with variable outcomes and high recurrence rates. Methods: We report on 22 consecutive cases of chondromyxoid fibromas treated by intralesional curettage, four of which had adjuvant cementation at our institution between 2003 and 2010. We assessed the functional outcome using the Musculoskeletal Tumour Society (MSTS) scoring system. Results: Nine males and 16 females with a mean age of 36.5 years (range 11 to 73) and a mean follow-up of 60.7 months were included in the study. Local recurrence occurred in two patients (9%) within the first 2 years following the index procedure. This was treated by re-curettage only of the residual defect. Two postoperative complications occurred: a superficial wound infection in one patient and a transient deep peroneal nerve neurapraxia in the other. The mean postoperative MSTS score was 96.7%. Conclusions: Intralesional curettage and cementation is as an effective treatment strategy for chondromyxoid fibromas, providing satisfactory functional results with a low recurrence rate. Careful case selection with stringent clinical and radiographic follow-up is recommended
Hypothesis of Interaction: Reflections on its Theoretical and Practical Contributions for Second Language Acquisition (SLA)
This article is about one of the most influential hypothesis in the fields of applied linguistics and language learning. It is based on the work of a number of scholars who contributed to the understanding of this hypothesis such as Steve Krashen, Mike Long, Teresa Pica and Merrill Swain. It starts with a brief introduction about the significance of interaction hypothesis generally in language learning in general and its central role in second language acquisition (SLA). The next section reviews some of the fundamental works and studies that have investigated the theoretical and practical understanding of this phenomenon and its relationship to learners’ achievement. It also highlights the contribution of interaction hypothesis to learning in two basic areas: noticing and feedback. There are explanatory examples presented in the following section in order to show how interactional modification techniques are used by learners. The last section presents some concluding thoughts pertaining to this topic with a focus on how it can be employed in language learning classrooms
Reliability evaluation of scalable complex networks through delta-star conversion
Exact reliability evaluation of large size complex networks becomes intractable with conventional techniques due to the exponential scaling of the computation complexity as the size of network scales up. In this paper we develop a scalable model for the exact evaluation of system reliability of scalable complex networks of the n-tuple bridge type based on scaled delta-star conversion. The number of steps as well as the computation overhead is kept within practical limits as they scale up linearly with the size of the network. The proposed model enables simple numerical evaluation either manually or through spread-sheets
Recovery modeling in MPLS networks
Transmission of QoS based traffic over packet switched network typically requires resource reservation or differentiated treatment to guarantee an acceptable level of performance. But it is also essential to bound the disruption caused by failure of nodes or links for a real time traffic to a limit that is acceptable by the application. In this paper, a simulation platform models the impact of the MPLS recovery/protection schemes on the QoS traffic parameters including disruption time and number of out of order packets arriving at the destination. The simulation considers measures to alleviate drawbacks caused by recovery process
A Fractional LC − RC Circuit
Mathematics Subject Classification: 26A33, 30B10, 33B15, 44A10, 47N70, 94C05We suggest a fractional differential equation that combines the simple
harmonic oscillations of an LC circuit with the discharging of an RC circuit.
A series solution is obtained for the suggested fractional differential
equation. When the fractional order α = 0, we get the solution for the RC
circuit, and when α = 1, we get the solution for the LC circuit. For arbitrary
α we get a general solution which shows how the oscillatory behavior
(LC circuit) go over to a decay behavior (RC circuit) as grows from 0 to
1, and vice versa. An explanation of the behavior is proposed based on the
idea of the evolution of a resistive property in the inductor giving a new
value to the inductance that affects the frequency of the oscillator
Design of digital electricity meter
Common Electricity meters, which are currently used in houses, shops and some factories are bulky
expensive and inaccurate. Such features are incompatible with modern technological trends of
miniaturization accuracy and neat devices. This project presents the design and the model of a low cost
digital energy meter to overcome the short comings of the present meters. It is anticipated that a new neat
design based on integrated circuit technology employing digital measurement techniques will have a great
impact on electricity meters locally and worldwide. With a data storage capability and some form of
processing, it can provide the consumers with vital information on the trend of their energy consumption.
Such information will assist them in rationalizing their consumption. Intelligent energy meters may be
seen as most suitable and efficient way to facilitate easy solutions to the problem of rational consumption
An approach to enhance aggregated source specific multicast scheme
The Aggregated Source Specific Multicast (ASSM) scheme is proposed to overcome the limitations of Source Specific Multicast (SSM). It aims to handle the scalability issue of SSM. The key idea is that multiple groups are forced to share a single delivery tree. However, the ASSM scheme suffers from routers under utilization problem. In our previous work we have proposed an approach to overcome this problem. In this paper our proposed approach was presented and evaluated. It was shown that our proposed scheme results in achieving higher routers utilization
- …
