1,889 research outputs found

    ITV Update March 2011

    Get PDF
    This monthly newsletter from the State Department of Education contains valuable curriculum insights, K-12 and professional development resources, and relevant programming information airing on SCETV

    Achieving Privacy Assured Outsourcing of Data in Cloud Using Optimalvisual Cryptography

    Get PDF
    Abstract-Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses Linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency into consideration from the very beginning of the service flow. But it makes more complexity because the data is sent in its raw form to one cloud. The cryptography schemes are computationally more complex. In order to enhance the security and reduce the complexity, to use data obfuscation through a novel visual cryptography. A conventional threshold (k out of n) visual secret sharing scheme encodes one secret image into transparencies (called shares) such that any group of transparencies reveals when they are superimposed, while that of less than ones cannot. In the proposed work, novel multiple secret visual cryptographic schemes are used to encode the secret s images into n shares. Convert the data into basic images and send the encrypted form of image by using multiple visual cryptographic schemes. (k, n, s) -MVCS, in which the superimposition of each group of shares reveals the first, second, s th secret, respectively where s=n-k+1. The proposed system also considers visual cryptography without pixel expansion. A new scheme for visual cryptography is developed and configured for the cloud for storing and retrieving textual data. Testing the system with query execution on a cloud database indicates full accuracy in record retrievals with negligible false positives. In addition, the system is resilient to attacks from within and outside the cloud. An experimental result shows that the Complexity analysis, Security analysis, the system is tested against artificial intelligence/machine learning based attacks

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    Contextualizing Alternative Models of Secret Sharing

    Get PDF
    A secret sharing scheme is a means of distributing information to a set of players such that any authorized subset of players can recover a secret and any unauthorized subset does not learn any information about the secret. In over forty years of research in secret sharing, there has been an emergence of new models and extended capabilities of secret sharing schemes. In this thesis, we study various models of secret sharing and present them in a consistent manner to provide context for each definition. We discuss extended capabilities of secret sharing schemes, including a comparison of methods for updating secrets via local computations on shares and an analysis of approaches to reproducing/repairing shares. We present an analysis of alternative adversarial settings which have been considered in the area of secret sharing. In this work, we present a formalization of a deniability property which is inherent to some classical secret sharing schemes. We provide new, game-based definitions for different notions of verifiability and robustness. By using consistent terminology and similar game-based definitions, we are able to demystify the subtle differences in each notion raised in the literature

    ‘I will not share my partner’ : the ‘care of the self’ in an HIV prevention campaign

    Get PDF
    Abstract: This article presents a textual examination and reception analysis of an HIV/AIDS poster used by the University of KwaZulu-Natal students during 2006–09. It examines how discourses construct self-responsibility for sexual health among female students. Discourse analysis, language and visual strategies are applied to reveal gender stereotypes. The article argues that an alternative discourse of femininity is used centring on female power bordering on active participation through the use of the discursive self ‘I’ in order to promote self-surveillance and individual agency

    eMedia Update March 2012

    Get PDF
    This monthly newsletter from the State Department of Education Office contains valuable curriculum insights, K-12 and professional development resources, and relevant programming information airing on SCETV

    Academic Integrity in Canada

    Get PDF
    This open access book presents original contributions and thought leadership on academic integrity from a variety of Canadian scholars. It showcases how our understanding and support for academic integrity have progressed, while pointing out areas urgently requiring more attention. Firmly grounded in the scholarly literature globally, it engages with the experience of local practicioners. It presents aspects of academic integrity that is specific to Canada, such as the existence of an "honour culture", rather than relying on an "honour code". It also includes Indigenous voices and perspectives that challenge traditional understandings of intellectual property, as well as new understandings that have arisen as a consequence of Covid-19 and the significant shift to online and remote learning. This book will be of interest to senior university and college administrators who are interested in ensuring the integrity of their institutions. It will also be of interest to those implementing university and college policy, as well as those who support students in their scholarly work

    A systematic review on machine learning models for online learning and examination systems

    Get PDF
    Examinations or assessments play a vital role in every student’s life; they determine their future and career paths. The COVID pandemic has left adverse impacts in all areas, including the academic field. The regularized classroom learning and face-to-face real-time examinations were not feasible to avoid widespread infection and ensure safety. During these desperate times, technological advancements stepped in to aid students in continuing their education without any academic breaks. Machine learning is a key to this digital transformation of schools or colleges from real-time to online mode. Online learning and examination during lockdown were made possible by Machine learning methods. In this article, a systematic review of the role of Machine learning in Lockdown Exam Management Systems was conducted by evaluating 135 studies over the last five years. The significance of Machine learning in the entire exam cycle from pre-exam preparation, conduction of examination, and evaluation were studied and discussed. The unsupervised or supervised Machine learning algorithms were identified and categorized in each process. The primary aspects of examinations, such as authentication, scheduling, proctoring, and cheat or fraud detection, are investigated in detail with Machine learning perspectives. The main attributes, such as prediction of at-risk students, adaptive learning, and monitoring of students, are integrated for more understanding of the role of machine learning in exam preparation, followed by its management of the post-examination process. Finally, this review concludes with issues and challenges that machine learning imposes on the examination system, and these issues are discussed with solutions

    eMedia Update March 2013

    Get PDF
    This monthly newsletter from the State Department of Education Office contains valuable curriculum insights, K-12 and professional development resources, and relevant programming information airing on SCETV
    • …
    corecore