754 research outputs found
RETRACTED: Analyzing challenging aspects of IPv6 over IPv4
This article has been retracted by the publisher.
This article has been retracted at the request of The International Arab Journal of Information Technology (IAJIT) report because of misconduct and plagiarism. The document and its content have been removed from the Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, and reasonable effort should be made to remove all references to this article
A qualitative approach to the identification, visualisation and interpretation of repetitive motion patterns in groups of moving point objects
Discovering repetitive patterns is important in a wide range of research areas, such as bioinformatics and human movement analysis. This study puts forward a new methodology to identify, visualise and interpret repetitive motion patterns in groups of Moving Point Objects (MPOs). The methodology consists of three steps. First, motion patterns are qualitatively described using the Qualitative Trajectory Calculus (QTC). Second, a similarity analysis is conducted to compare motion patterns and identify repetitive patterns. Third, repetitive motion patterns are represented and interpreted in a continuous triangular model. As an illustration of the usefulness of combining these hitherto separated methods, a specific movement case is examined: Samba dance, a rhythmical dance will? many repetitive movements. The results show that the presented methodology is able to successfully identify, visualize and interpret the contained repetitive motions
Entropy as a Measure of Quality of XML Schema Document
In this paper, a metric for the assessment of the structural complexity of eXtensible Markup Language schema
document is formulated. The present metric ‘Schema Entropy is based on entropy concept and intended to measure the
complexity of the schema documents written in W3C XML Schema Language due to diversity in the structures of its elements. The SE is useful in evaluating the efficiency of the design of Schemas. A good design reduces the maintainability efforts. Therefore, our metric provides valuable information about the reliability and maintainability of systems. In this respect, this
metric is believed to be a valuable contribution for improving the quality of XML-based systems. It is demonstrated with examples and validated empirically through actual test cases
A Session based Multiple Image Hiding Technique using DWT and DCT
This work proposes Steganographic technique for hiding multiple images in a
color image based on DWT and DCT. The cover image is decomposed into three
separate color planes namely R, G and B. Individual planes are decomposed into
subbands using DWT. DCT is applied in HH component of each plane. Secret images
are dispersed among the selected DCT coefficients using a pseudo random
sequence and a Session key. Secret images are extracted using the session key
and the size of the images from the planer decomposed stego image. In this
approach the stego image generated is of acceptable level of imperceptibility
and distortion compared to the cover image and the overall security is high.Comment: 4 pages,16 figures, "Published with International Journal of Computer
Applications (IJCA)
- …