17 research outputs found

    Big Data and Privacy Issues for Connected Vehicles in Intelligent Transportation Systems

    Get PDF
    The evolution of Big Data in large-scale Internetof-Vehicles has brought forward unprecedented opportunities for a uniïŹed management of the transportation sector, and for devising smart Intelligent Transportation Systems. Nevertheless, such form of frequent heterogeneous data collection between the vehicles and numerous applications platforms via diverse radio access technologies has led to a number of security and privacy attacks, and accordingly demands for a ‘secure data collection’ in such architectures. In this respect, this chapter is primarily an effort to highlight the said challenge to the readers, and to subsequently propose some security requirements and a basic system model for secure Big Data collection in Internet-of-Vehicles. Open research challenges and future directions have also been deliberated

    Electronic government Services Usage, Adoption and Evaluation: A Review Paper

    No full text
    This article provides information about the electronic government services adoption, usage, and evaluations; inaddition to that it discusses the technology acceptance model used in the topic area as well as the theoreticalframework that are constructed in this field. This paper presented number of relevant authors and there focuses areain both developed and developing nations. Some discoveries were made during this study, this includes thecomparison on the e-government services within the US cities and other research are comparison between theselected developed nations. Finally, few suggestions were found based on the electronic government services in theFederal Republic of Nigeria in addition to other developing nations.</div

    Big Data and Privacy Issues for Connected Vehicles in Intelligent Transportation Systems

    Full text link
    The evolution of Big Data in large-scale Internet-of-Vehicles has brought forward unprecedented opportunities for a unified management of the transportation sector, and for devising smart Intelligent Transportation Systems. Nevertheless, such form of frequent heterogeneous data collection between the vehicles and numerous applications platforms via diverse radio access technologies has led to a number of security and privacy attacks, and accordingly demands for a secure data collection in such architectures. In this respect, this chapter is primarily an effort to highlight the said challenge to the readers, and to subsequently propose some security requirements and a basic system model for secure Big Data collection in Internet-of-Vehicles. Open research challenges and future directions have also been deliberated

    Image Compression Techniques in Networking: Review Paper

    No full text
    Data compression is the process of reducing redundancy in data representation in order to achieve savings in storage and communicationcosts. It is a popular approach to reducing data volumes to lower disk utilization and reduce network traffic, hence reduce data transfer timesin distributed computing. The research paper is presented and focused on the significant of using data compression in networking as well asits different types of image compression techniques. They are lossless and lossy image compression methods. It explores comparison forsome image format such as jpeg, tiff, bmp, png, included algorithms for each formats, each format such as jpeg2000, and the methods aredescribed in details with using figures. It shows the coding types and categories s such as DPCM, entropy coding, Huffman coding, arithmeticcoding, LZW.</div

    Latent Fingerprint Enhancement Based on Directional Total Variation Model with Lost Minutia Reconstruction

    No full text
    Image enhancement plays an important role in biometric systems, this paper presented automatic latentfingerprint segmentation and matching. While considerable progress has made in both rolled and plain fingerprintimage enhancement, latent fingerprint enhancement is a challenging problem due to the poor image quality of latentfingerprint with unclear ridge structures and various overlapping patterns, along with the presence of structured noise.Prior to latent fingerprint segmentation and feature extraction, latent fingerprint image enhancement is important tosuppress various types of noise and to clarify the ridge structure. This paper reviews the current techniques used forlatent fingerprint enhancement and presents a hybrid model which combines the edge directional total variationmodel (EDTV) and quality image enhancement with lost minutia reconstruction. The NIST SD27 database is used totest the performance of the proposed techniques with RMSE and PSNR. The proposed technique is effectively clarifyinput latent fingerprint images and eliminate noise in good, bad and ugly latent fingerprint images. A statisticallysignificant difference, which focused on the mean lengths of PSNR and RMSE for different categories of latentfingerprint, images (good, bad and ugly). The proposed technique performs well for the good latent fingerprint images compare to bad and ugly images. Enhancement respectively presents RMSE averages of 0.018373, 0.022287, and 0.023199 for the good, bad and ugly image SD27 image set, as opposed to 82.99068, 81.39749, and 81.07826 for PSNR. The proposed enhancement technique improved the matching accuracy of latent fingerprint images by about 30%. </div

    Vertical handover decision schemes in fourth generation heterogeneous cellular networks: A comprehensive study

    No full text
    Vertical Handover Decision (VHD) algorithms are indispensable components of forthcoming 4G heterogeneous wireless networks architecture – so as to provide requisite Quality of Service to an assortment of applications anywhere at any time, while allowing seamless roaming in highly dynamic scenarios (i.e. multitude of access network technologies that vary in bandwidth, latency, monetary cost, etc.) using Mobile Terminals (MTs) enabled with multiple access interfaces. In this article, a critical review of the existing VHD algorithms has been carried out as an effort to update the previous studies. To offer a methodical contrast, recently published VHD algorithms have been classified into four major classes depending on the key handover decision criterion used, i.e. RSS based algorithms, bandwidth based algorithms, cost function based algorithms, and the combination algorithms. Moreover, operational fundamentals, advantages, and disadvantages of exemplary VHD algorithms for each class have been presented to assess the tradeoffs between their intricacy of implementation and the efficacy. Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited

    Electronic government Services Usage, Adoption and Evaluation: A Review Paper

    No full text
    This article provides information about the electronic government services adoption, usage, and evaluations; inaddition to that it discusses the technology acceptance model used in the topic area as well as the theoreticalframework that are constructed in this field. This paper presented number of relevant authors and there focuses area in both developed and developing nations. Some discoveries were made during this study, this includes thecomparison on the e-government services within the US cities and other research are comparison between theselected developed nations. Finally, few suggestions were found based on the electronic government services in theFederal Republic of Nigeria in addition to other developing nations. </div

    EVALUATING IPv4 TO IPv6 TRANSITION FOR A SMALL ENTERPRISE IN NIGERIA

    No full text
    The aim of the study is to investigate the deployment and implementation of the new generation IP that is the IPv6 in Nigeria for smallcompanies. This is to give deep insight into the knowledge of IPv6 in general, transition methods and evaluate the ways to do transitionfrom IPv4 network to IPv6, small companies in Nigeria required to easy migration without disrupting their business activities. In this studyhas investigated by using opinion Survey for us to get the resolutions on transition from IPv4 to IPv6 base on need of the company toidentify company that can utilized. However, the development has through simulation deployment study and to investigate the differencesbetween the IPv4 and IPv6 and to apply the transition to evaluate the effective transition method. </div

    Image Compression and Encryption Technique: Review Paper

    No full text
    ompression is reducing size of data for storage and transmission bandwidth. Image compression technique is lossless and lossy, the technique is to keep or reduce output of decompress format compare to original source. The lossless and lossy compression technique will have their process and algorithm to completed their objective compression and decompression.Encryption is about securing image exchanging via internet, thus prevent to be accessed by unauthorized users. Basic encryptionmethod is symmetric and asymmetric. </div

    Efficient Real Time Attendance System Based on Face Detection Case Study “MEDIU Staff”

    No full text
    Recently, using biometrics applications for person’s authentication has received more attention by computer vision researchers.Biometrics applications play an important role in reliable person authentication for recording the attendance of employees in the largeorganizations. Face detection is considered as an optimal solution for enrolment attendance among all biometrics applications such asFingerprint. The main objective of this paper is to instigate a develop attendance system automatically in Al-Madinah International University(MEDIU) and achieve higher both accuracy and performance. To develop system of face detector under challenging of face the proposedsystem accuracy using real life videos by establishing Data Base for MIDIO staff. This paper suggests a combination detector based of voila Jones which deals with challenges in real time of video. In the conducted study the system was capable of determine one face or more in real time extremely rapidly while achieving high detection rates with accurate and effective performance. The detection results of 100 frame per video from the data base was satisfying, with the highest result was 96% and the lowest one was 63%. </div
    corecore