14 research outputs found

    The Security of Elliptic Curve Cryptosystems - A Survey

    Get PDF
    Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then its2019; major cryptographic uses are given. These include its2019; use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed. It was found that ECC was well suited for low-power and resource constrained devices because of its2019; small key size

    The Media Layers of the OSI (Open Systems Interconnection) Reference Model: A Tutorial

    Get PDF
    The Media Layers of the open systems interconnection (OSI) reference model convert bits to packets. It is a very important aspect of network communication and consists of various networking protocols. At the lowest level the physical layer deals with Media, Signal and Binary Transmission of Bits. Then there is the Data Link layer which deals with media access control (MAC) and logical link control (LLC) Physical Addressing of Frames, for example Ethernet. Finally, there is the Network layer which deals with Path Determination and IP Logical addressing of Packets. This article gives a review of these Media Layers and will contribute to adding knowledge for a networking novice while consolidating concepts for an experienced professional or academic

    A fuzzy c-means bi-sonar-based Metaheuristic Optimization Algorithm

    Get PDF
    Fuzzy clustering is an important problem which is the subject of active research in several real world applications. Fuzzy c-means (FCM) algorithm is one of the most popular fuzzy clustering techniques because it is efficient, straightforward, and easy to implement. Fuzzy clustering methods allow the objects to belong to several clusters simultaneously, with different degrees of membership. Objects on the boundaries between several classes are not forced to fully belong to one of the classes, but rather are assigned membership degrees between 0 and 1 indicating their partial membership. However FCM is sensitive to initialization and is easily trapped in local optima. Bi-sonar optimization (BSO) is a stochastic global Metaheuristic optimization tool and is a relatively new algorithm. In this paper a hybrid fuzzy clustering method FCB based on FCM and BSO is proposed which makes use of the merits of both algorithms. Experimental results show that this proposed method is efficient and reveals encouraging results

    Security in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) pose a new challenge to network designers in the area of developing better and secure routing protocols. Many sensor networks have mission-critical tasks, so it is clear that security needs to be taken into account at design time. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. The security issues posed by sensor networks represent a rich field of research problems. Improving network hardware and software may address many of the issues, but others will require new supporting technologies. With the recent surge in the use of sensor networks, for example, in ubiquitous computing and body sensor networks (BSNs) the need for security mechanisms has a more important role. Recently proposed solutions address but a small subset of current sensor network attacks. Also because of the special battery requirements for such networks, normal cryptographic network solutions are irrelevant. New mechanisms need to be developed to address this type of network

    The Security of Elliptic Curve Cryptosystems - A Survey

    Get PDF
    Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then its’ major cryptographic uses are given. These include its’ use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed. It was found that ECC was well suited for low-power and resource constrained devices because of its’ small key size

    Quantum Computing Tutorial Bits vs Qubits and Shors Algorithm

    Get PDF
    The speculative inquiry that computation could be done in general more efficiently by utilizing quantum effects was introduced by Richard Feynman. Peter Shor described a polynomial time quantum algorithm for factoring integers by a quantum machine, which proved the speculation true. Quantum systems utilize exponential parallelism, which cannot be done by classical computers. However, quantum decoherence poses a difficulty for measuring quantum states in modern quantum computers. This paper elaborates on some basic concepts applied to quantum computing. It first outlines these key concepts, introduces the mathematics needed for understanding quantum computing and finally explores the Shor’s Algorithm as it applies to both classical and quantum computer securit

    User-Centric Algorithms: Sculpting the Future of Adaptive Video Streaming

    No full text
    This paper explores the transformative potential of user-centric algorithms in shaping the future landscape of adaptive video streaming. Traditional streaming methods, though effective, often lack the ability to dynamically adapt to individual user preferences. We argue for a paradigm shift towards user-centricity, where algorithms are designed to consider user behavior, preferences, and feedback to optimize content delivery. By examining the impact of personalized streaming experiences on viewer satisfaction and engagement, we present a compelling case for the integration of machine learning and artificial intelligence in adaptive video streaming. Through real-world examples and case studies, we showcase the efficacy of user-centric algorithms in sculpting a more tailored and immersive streaming environment. This paper provides insights into the challenges, considerations, and future trends surrounding user-centric adaptive video streaming, highlighting its potential to redefine the viewer experience and set new standards for digital content delivery

    Adaptive Video Streaming: Navigating Challenges, Embracing Personalization, and Charting Future Frontiers

    No full text
    This review paper explores the paradigm of personalized adaptive streaming, where machine learning techniques are employed to tailor video streaming experiences based on individual user behavior, preferences, and contextual factors. The paper begins by elucidating the evolution of video streaming and the critical role of adaptive streaming in modern multimedia consumption. It provides a comprehensive overview of adaptive video streaming, covering its basics, traditional approaches, and associated challenges. Emphasizing the significance of personalization in enhancing user experience, the paper then delves into the integration of machine learning in adaptive streaming systems. Specific personalized adaptive streaming techniques, including user profiling, context-aware adaptation, and real-time adjustments based on user behavior, are discussed in detail. Case studies and applications showcase notable platforms, successes, and challenges. A comparative analysis of machine learning models and algorithms is conducted, followed by a discussion on current challenges, ethical considerations and future research directions. The paper concludes by summarizing key findings and urging researchers and industry practitioners to contribute to the evolving landscape of personalized adaptive streaming

    Categorizing 2019-N-CoV Twitter Hashtag Data by Clustering

    No full text

    S-MDP: Streaming With Markov Decision Processes

    No full text
    corecore