Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.
Abstract: Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Abstract: Deformable active contours are widely used in
computer vision and image processing applications for image
segmentation, especially in biomedical image analysis. The active
contour or “snake" deforms towards a target object by controlling the
internal, image and constraint forces. However, if the contour
initialized with a lesser number of control points, there is a high
probability of surpassing the sharp corners of the object during
deformation of the contour. In this paper, a new technique is
proposed to construct the initial contour by incorporating prior
knowledge of significant corners of the object detected using the
Harris operator. This new reconstructed contour begins to deform, by
attracting the snake towards the targeted object, without missing the
corners. Experimental results with several synthetic images show the
ability of the new technique to deal with sharp corners with a high
accuracy than traditional methods.
Abstract: The oil and gas industry has moved towards Load and
Resistance Factor Design through API RP2A - LRFD and the
recently published international standard, ISO-19902, for design of
fixed steel offshore structures. The ISO 19902 is intended to provide
a harmonized design practice that offers a balanced structural fitness
for the purpose, economy and safety. As part of an ongoing work, the
reliability analysis of tubular joints of the jacket structure has been
carried out to calibrate the load and resistance factors for the design
of offshore platforms in Malaysia, as proposed in the ISO.
Probabilistic models have been established for the load effects (wave,
wind and current) and the tubular joints strengths. In this study the
First Order Reliability Method (FORM), coded in MATLAB
Software has been employed to evaluate the reliability index of the
typical joints, designed using API RP2A - WSD and ISO 19902.
Abstract: The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.
Abstract: Modern organizations operate under the pressure of
dynamic and often unpredictable changes, both in external and
internal environment. Market success, in this context, requires a
particular competence in the form of flexibility, interpreted here both
on the level of individuals and on the level of organization. This
paper addresses the changes taking place in the sphere of
employment, as observed in economic entities operating on Polish
market. Based on own empirical studies, the authors focus on the
progressing trend of ‘flexibilization’ of employment, particularly in
the context of transformations in organizational structure, designed to
facilitate the transition into management by projects and
differentiation of labor forms.
Abstract: In this paper, we propose a chaotic cipher system consisting of Improved Volterra Filters and the mapping that is created from the actual voice by using Radial Basis Function Network. In order to achieve a practical system, the system supposes to use the digital communication line, such as the Internet, to maintain the parameter matching between the transmitter and receiver sides. Therefore, in order to withstand the attack from outside, it is necessary that complicate the internal state and improve the sensitivity coefficient. In this paper, we validate the robustness of proposed method from three perspectives of "Chaotic properties", "Randomness", "Coefficient sensitivity".
Abstract: Despite the fact that B2c eCommerce has become
important in numerous economies, its adoption varies from country to
country. This paper aims to identify the factors affecting (enabling or
inhibiting) B2c eCommerce and to determine their quantitative
impact on the diffusion of online sales across countries. A dynamic
panel model analyzing the relationship between 13 factors
(Macroeconomic, Demographic, Socio-Cultural, Infrastructural and
Offer related) stemming from a complete literature analysis and the
B2c eCommerce value in 45 countries over 9 years has been
developed. Having a positive correlation coefficient, GDP, mobile
penetration, Internet user penetration and credit card penetration
resulted as enabling drivers of the B2c eCommerce value across
countries, whereas, having a negative correlation coefficient,equal
distribution of income and the development of traditional retailing
network act as inhibiting factors.
Abstract: Cloud Computing (CC) has become one of the most
talked about emerging technologies that provides powerful
computing and large storage environments through the use of the
Internet. Cloud computing provides different dynamically scalable
computing resources as a service. It brings economic benefits to
individuals and businesses that adopt the technology. In theory
adoption of cloud computing reduces capital and operational
expenditure on information technology. For this to be a reality there
is need to solve some challenges and at the same time addressing
concerns that consumers have about cloud computing. This paper
looks at Cloud Computing in general then highlights the challenges
of Cloud Computing and finally suggests solutions to some of the
challenges.
Abstract: Musculoskeletal problems are common in high
performance dance population. This study attempts to identify lower
extremity muscle flexibility parameters prevailing among
bharatanatyam dancers and analyze if there is any significant
difference exist between normal and injured dancers in flexibility
parameters. Four hundred and one female dancers and 17 male
dancers were participated in this study. Flexibility parameters
(hamstring tightness, hip internal and external rotation and
tendoachilles in supine and sitting posture) were measured using
goniometer. Results of our study it is evident that injured female
bharathnatyam dancers had significantly (p < 0.05) high hamstring
tightness on left side lower extremity compared to normal female
dancers. The range of motion for left tendoachilles was significantly
(p < 0.05) high for the normal female group when compared to
injured dancers during supine lying posture. Majority of the injured
dancers had high hamstring tightness that could be a possible reason
for pain and MSDs.