Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!

Znaleziono wyników: 7

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  hashing
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure commu-nication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency.
EN
The article describes the research of image analysis methods. The methods of indexing images for the search of duplicate images, as well as methods for finding similar images based on the definition of key points are described. The prototype of the system was created, and testing of the described methods was carried out. The result of the analysis became the basis for the information system project of reverse search of similar or identical images.
3
Content available Compact and hash based variants of the suffix array
EN
Full-text indexing aims at building a data structure over a given text capable of efficiently finding arbitrary text patterns, and possibly requiring little space. We propose two suffix array inspired full-text indexes. One, called SA-hash, augments the suffix array with a hash table to speed up pattern searches due to significantly narrowed search interval before the binary search phase. The other, called FBCSA, is a compact data structure, similar to Mäkinen’s compact suffix array (MakCSA), but working on fixed size blocks. Experiments on the widely used Pizza & Chili datasets show that SA-hash is about 2–3 times faster in pattern searches (counts) than the standard suffix array, for the price of requiring 0.2n–1.1n bytes of extra space, where n is the text length. FBCSA, in one of the presented variants, reduces the suffix array size by a factor of about 1.5–2, while it gets close in search times, winning in speed with its competitors known from the literature, MakCSA and LCSA.
4
Content available remote Password Security Mechanisms : Comparitive Study
EN
Nowadays online communication is increasing rapidly, password is provided as a key for communication henceforth there is a strong need to authenticate the online communication. But currently security breach occurs by stealing the password files through various ways of cyber attacks. Different technologies are available to safeguard password. The purpose of this paper is to evaluate various techniques for protection of password like graphical password, text password enhanced by Honeyword, Jumbling and salting approach.
EN
This article presents one of the mechanisms of ensuring security in applications designed in Java programming language - hashing algorithms. It describes selected elements of Java Cryptographic Architecture library. Chosen algorithms were scrutinized in terms of the security and how fast they work.
PL
W artykule został przedstawiony jeden z mechanizmów zapewniania bezpieczeństwa w aplikacjach wytwarzanych w środowisku Java - algorytmy haszujące. Zostały również opisane wybrane elementy biblioteki Java Cryptographic Architecture. Wybrane algorytmy zostały przeanalizowane pod kątem zarówno bezpieczeństwa, jak i szybkości działania.
6
Content available remote Advanced system for organization of work and scientific data exchange
EN
The purpose of this project was to create a system that would help in organizational and scientific data exchange. The system has been put into production at the Department of Bioinformatics and Telemedicine of the Medical College of Jagiellonian University. The system is designed for the university staff, doctors, experts, students as well as anyone interested. The system helps to maintain fast and efficient data exchange of both administrative and scientific kind, particularly directed towards the medical and related fields such as biostatistics, bioinformatics and telemedicine. This paper shows in detail: the design of the system, technology involved, functionality of the system, data flow, database structure, and security system, all matching the requirements of the project. The conclusion contains a discussion on the system's future growth for which the project is prepared for as well as direct examples of some of the possible new features.
PL
Głównym celem pracy byto stworzenie systemu wspomagania wymiany danych naukowych. System został skonfigurowany dla wymagań Zakładu Bioinformatyki i Telemedycyny Collegium Medicum Uniwersytetu Jagiellońskiego. System przeznaczony jest zarówno dla pracowników jednostki naukowej a także lekarzy, studentów oraz innych współpracownikow. Umożliwia on pełniejszą, i szybszą, wymianę informacji zarówno organizacyjno-administracynych jak i naukowych. System został stworzony do zarządzania danymi pochodzącymi z nauk medycznych i innych pokrewnych dyscyplin w szczególności informatyki medycznej, telemedycyny, bioinformatyki. Artykuł pokazuje nowatorskie rozwiązania zastosowane w skonstruowanym systemie zarządzania treścią. (CMS), które znacznie poprawiają, jego funkcjonalność. Szczególny nacisk został położony na kwestie bezpieczeństwa, poziomy dostępności danych i profile użytkowników. W systemie zostały zaimplementowane zaawansowane rozwiązania informatyczne dotyczące mechanizmów wyszukiwania danych jak fonetyczne porównanie i wielopoziomowe przydzielenie uprawnień.
EN
This paper examines the use of hashing in the multiobjective tabu search, TAMOCO. The hasliing method was suggested by Woodruff and Zemel (1993) as a method of avoiding return to the already examined solutions in the standard single-objective tabu search. While the traditional tabu list is capable of insuring this, it can normally only be used for cycles of a moderate length. The hashing method, however, can efficiently avoid cycles over a much larger number of iterations and must be considered a natural component in the tabu search tool-box. We report from two experiments on practical models where the hashing component has been included into the TAMOCO-procedure ; with two different outcomes.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.