Recent Advances in Information Technology: RAIT-2014 by G. P. Biswas, Sushanta Mukhopadhyay

By G. P. Biswas, Sushanta Mukhopadhyay

The publication is predicated at the study papers offered in moment overseas convention on fresh Advances in info know-how (RAIT 2014), held at Indian college of Mines, Dhanbad, India. It presents the newest advancements within the region of knowledge expertise and covers a number of subject matters, together with complex set of rules layout and research, Algorithmic Graph concept, synthetic Intelligence, Bioinformatics, Circuit layout Automation, Computational Biology, Computational arithmetic, Cryptology, facts Compression, Database administration approach, info Mining, E-Applications, Embedded approach, info and community protection, details Retrieval, web Computing, and so on. the target is to familiarize the reader with the most recent clinical advancements which are occurring in a variety of fields and the most recent subtle challenge fixing instruments which are being constructed to house the advanced and complex difficulties which are in a different way tough to unravel via the standard and conventional methods.

Show description

Read or Download Recent Advances in Information Technology: RAIT-2014 Proceedings PDF

Similar information theory books

Theory of Information: Fundamentality, Diversity and Unification (World Scientific Series in Information Studies)

This certain quantity offers a brand new strategy - the final idea of knowledge - to medical realizing of knowledge phenomena. in response to a radical research of data strategies in nature, expertise, and society, in addition to at the major instructions in details idea, this idea synthesizes latest instructions right into a unified process.

Managing Economies, Trade and International Business

The present part of globalization and the elevated interconnectedness of economies via exchange have prompted the administration and development premiums of economies and likewise the aggressive and managerial concerns for companies. This ebook makes a speciality of 3 major concerns – monetary progress and sustainable improvement; alternate, legislations and rules; and aggressive and managerial matters in overseas company – from a multidisciplinary, transversal and eclectic point of view.

Efficient Secure Two-Party Protocols: Techniques and Constructions

The authors current a complete examine of effective protocols and methods for safe two-party computation – either common buildings that may be used to soundly compute any performance, and protocols for particular difficulties of curiosity. The publication makes a speciality of thoughts for developing effective protocols and proving them safe.

Information Theory and Best Practices in the IT Industry

​​​The significance of benchmarking within the carrier zone is easily well-known because it is helping in non-stop development in items and paintings tactics. via benchmarking, businesses have strived to enforce top practices so as to stay aggressive within the product- marketplace during which they function. in spite of the fact that reports on benchmarking, fairly within the software program improvement zone, have ignored utilizing a number of variables and consequently haven't been as accomplished.

Extra resources for Recent Advances in Information Technology: RAIT-2014 Proceedings

Sample text

Terms supposed not to be known by the intruder are still secret. 36 seconds ATTACK TRACE No attack found ATTACK TRACE No attacks have been found.. (a) (b) Fig. 3 Simulation results in a SATMC and b TA4SP model checkers Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC 33 (2) The adversary AII knows the identity-based private key dB of IDB but, the public key PB = xBP of IDB cannot be replaced by a value chosen by him. To forge our CL-EE scheme, AII tries to solve the DDH problem from hP, C1 = tP, PB = xBPi that is assumed to be hard.

Mishra, S. K. Hafizul Islam and G. P. Biswas Abstract Owing the advantages of Elliptic Curve Cryptography (ECC), we proposed a Certificateless Public Key Cryptosystem (CL-PKC)-based ElGamal Encryption (CL-EE) scheme using ECC in this paper. In literature, ECC-based ElGamal Encryption scheme is devised using Certificate Authority-based Public Key Cryptography (CA-PKC) that needs a global Public Key Infrastructure (PKI) to maintain the public keys and certificates. Moreover, in PKI architecture, the sender must have the additional ability to verify the public key certificate of the receiver.

4 Demonstration of the Proposed Method A step-wise demonstration of the proposed method on a coffee bean image is shown in Fig. 4. The input coffee bean image shown in Fig. 4a contains a numbers of beans colored as black. The outer isothetic covers (both hole OIC and border OIC indicated in red) are shown in Fig. 4b. The joining points are marked (shown with blue dots) when two consecutive 270° vertices, or a 270° vertex with long arms, are observed while deriving the OICs (Fig. 4c). Each of the joining points of the hole OIC is paired with its nearest joining point on the border OIC; a separator is drawn for each matching pair (Fig.

Download PDF sample

Rated 4.36 of 5 – based on 21 votes