Sep 01, 2020Open AccessArticle
The Internet of Things and artificial intelligence have developed rapidly in recent decades, and intelligent robots have been used in various fields of production and life. There are many requirements for the functions, performance and intelligence of smart robots. Many researchers are committed to how intelligent robots can learn more efficiently and develop new functions. How to obtain the learning data while protecting the privacy of users and how to record the learning process are two major ...
Jul 30, 2020Open AccessArticle
The objective of this work is to design and implement an enhanced wed-based certificate verification system that will assist schools and co-operate organizations to confirm the originality of students’ certificate by displaying certificate details, and format with owner’s image. This work was motivated by the level of certificate forgery, time wastage and the stress encountered while processing this manually. The system adopted the object oriented and design methodology (OOADM) while the program...
Apr 12, 2018Open AccessArticle
Based on the form of questionnaire, this paper
explores the use of foreign academic e-books by teachers and students in a
certain school from a subjective view. 367 Users’ behavior, habits and
needs were analyzed. Based on the results of the analysis, four suggestions are
put forward to improve the overall utilization: Promote the localization of
interface, pay attention to users’ advice while
Mar 19, 2018Open AccessArticle
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re
Oct 11, 2016Open AccessArticle
Design Secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach  is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks: (i) leaking of the static secret key which will be utilized in computing the exponent of the ephemeral public key; (ii) ma
Apr 28, 2016Open AccessArticle
Mobile Cloud computing is a technology of delivering services, such as software,
hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled
in order to explore, especially Smart phones. The mobile cloud computing technology
is growing rapidly among the customers and many companies such as Apple, Google,
Facebook and Amazon with rich users. Users can access their data at any time, at
any place, even with any device including mobile devices by using the cloud storage
Nov 25, 2015Open AccessArticle
Smart TV broadcasting system is an extensively deployed application which
charges users based on their subscription. In Smart TV broadcasting service
environments, services providers charge subscription fee by scrambling the
programs in CAS. This technique abstain unauthorized televiewers to watch and receive
the program. Smart TV malware presents significant threat to Homeland Security.
Security for contents running on smart TV terminals is important. As a new
smart TV operating system, SMART T...
Oct 22, 2014Open AccessArticle
Security mechanism is a fundamental requirement of
wireless networks in general and Wireless Sensor Networks (WSN) in particular. The
Intrusion Detection System (IDS) has become a critical component of wireless
sensor networks security strategy. There are several architectures for embedding
IDS in WSN. Due to Energy Limitation, in this paper we use a distributed
architecture which activates intrusion detection system for limited number of
nodes. For this purpose we select a secure set of nodes c...
Oct 21, 2014Open AccessArticle
A frequency modulation broadcast station trainer
was developed to expose the students to the basic equipment needed in radio
broadcasting. The cost of portable FM broadcast trainer is much lower than the
cost of the traditional commercially available equipment because of the
materials used. The FM broadcast trainer is laboratory equipment that can be
used by schools offering academic programs in industrial courses specifically
Electronics and Communication Technology courses. At present there is...