Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Sound Design and Science Fiction  [cached]
Thomas Van Parys
Image and Narrative : Online Magazine of the Visual Narrative , 2009,
Abstract: Book Review: Sound Design and Science Fiction William Whittington, Sound Design and Science Fiction. Austin: University of Texas Press, 2007. ISBN: 978-0-292-71431-1
Design for security, the British experience  [PDF]
Ivan Stani?
Urbani Izziv , 1999,
Abstract: Design for security against criminal acts is a mode of preventive activity, whereby security measures are integrated in a cost efficient way, thus creating benefits for developers and future inhabitants. The article presents an example of an institutional
Design-Efficiency in Security  [PDF]
Ender Yüksel,Hanne Riis Nielson,Flemming Nielson
Computer Science , 2013,
Abstract: In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-efficiency of key updates. We employ probabilistic model checking approach and present our modelling and analysis study using PRISM model checker.
Object Oriented Design Security Quantification  [cached]
Suhel Ahmad Khan
Journal of Global Research in Computer Science , 2011,
Abstract: Quantification of security at early phase produces a significant improvement to understand the management of security artifacts for best possible results. The proposed study discusses a systematic approach to quantify security based on complexity factors which having impact on security attributes. This paper provides a road-map to researchers and software practitioner to assess, and preferably, quantify software security in design phase. A security assessment through complexity framework (SVDF) has been proposed in order to incorporate security to develop quality products. It may be used to benchmark software products according to their severity.
Design Methods for Embedded Security  [PDF]
M. Kne?evi?,V. Ro?i?,I. Verbauwhede
Telfor Journal , 2009,
Abstract: Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper we show a typical top-down approach for secure and efficient implementation of embedded systems. We outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - we show how the design can be implemented to be both efficient and secure.
Design and Implementation on System Security View in SoftOS

LI Guo-Le,WANG Yi,MAO Bing,

计算机科学 , 2007,
Abstract: The complexity and diversity of the security make it difficult for users to get an intuitionistic and full-scale comprehension of security conditions of the system,let alone timely response and disposal with abnormal events.In the process of building SoftOS,a type of security strengthened OS,by means of research on the relationships between various subjects and objects,as well as the resource consumption and system security,we design and implement the System Security View,i.e,SecView,for the purpose of providing and analysing integrated and comprehensive security related information so as to assist users in knowing the security status of the system fully and conducting proper disposals.
A. Kirthika,S. Arumugam
International Journal of Advances in Engineering and Technology , 2012,
Abstract: Hand geometry based verification systems are amongst the utmost in terms of user satisfactoriness for biometric qualities. This is obvious from their extensive profitable deployments around the world. Regardless of the profitable achievement, a number of issues remain to be addressed to formulate these systems more comprehensible. Shape features (hand/finger geometry) obtained from the hand carry restricted inequitable information and, thus, they are not recognized to be extremely distinctive. This paper presents a new technique for hand matching using texture and color intensive biometric (TCIB) for multimodal security that achieves considerable performance even for the large pose variations with diverse angles. The proposed TCIB for hand geometry and palm print uses both 2D and 3D hand images, to attain an intensity and range images of the user’s hand offered to the system in a random pose. The approach involves Dynamic feature level combination to develop the performance of identifying similarity of the multimodal features. Multimodal palm print and hand geometry textures are concurrently mined from the user’s facade standardized textured 3-D hand, for identifying the similarity between the hand posture. Individual matching scores are united using a new combined value approach. An experimental results on the datasets with seven sample images in a considerable pose variations deferred better results compared to an existing Contact less and Pose Invariant Biometric Identification Using Hand Surface (CPBI). A reliable (across various hand features considered) performance improvement attained with the pose correction reveals the usefulness of the proposed TCIB approach for hand based biometric systems. The experimental results also suggest that the dynamic feature level approach presented in this work helps to attain performance enhancement of 60% (in terms of EER) over the case when matching scores are shared using the pixel rate.
Software Design Level Security Vulnerabilities  [PDF]
S. Rehman,K. Mustafa
International Journal of Software Engineering , 2011,
Abstract: Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to identify appropriate strategies for mitigating security flaws at the design level. In addition, an analysis is also carried out on the basis of frequency and severity of vulnerabilities identified under each class and the same has been intrinsically presented.
International Journal of Electrical, Electronics and Data Communication , 2013,
Abstract: In digital media, quality of stereo sound is more enjoyable than mono sound and most of the audio appliances in the market are using stereo quality transmission The prime objective of this paper is to focus on the principle concepts of stereo sound enhancement techniques and implement a stereo sound enhancement algorithm on modern FPGA board. Field programmable gate arrays (FPGAs), provide one of the major alternative in hardware platform scenario due to its reconfiguration nature, low price and marketing speed and it provides us a custom hardware platform where we can design and develop the desired algorithm and architecture using different built-in custom logic, DSP cores and automatic HDL code generation facility. The algorithm we have implemented is based on the concept of taking spatial information in audio components and enhanced it using delay and adding-subtraction techniques. This paper provides a basic methodology to convert a mono audio signal into stereo audio signal using behavioral approach in MATLAB. After that we have implemented hardware-in-the loop verification approach of the algorithm on Virtex-ml506 Board. We have used onboard audio Codec AC’97 for analog to digital conversion. Moreover we have added an extra facility of converting the sampling frequency from 8KHz to even 96KHz to enhance the audio quality. The present of System Generator in Simulink software is to generate the VHDL codes in order to produce a bit file that can be uploaded to Xilinx Vertex-ml506 FPGA board and finally the audio wave file is played using headphones
International Journal of Engineering Science and Technology , 2011,
Abstract: In this paper, new tool to generate the security template is proposed. Providing a secure system is a difficult task. Faulty and incomplete design can result into providing unsecure system. In the design phase, if the architect or the system designer knows what are the security parameters to be considered for the system then the proposed tool is helpful for them to generate the security template. We considered the Aspect-Oriented Risk-Driven Development (AORDD) methodology for developing secure systems. We considered few aspects like Authentication, RAD and SAS to generate security code template. Proposed tool will generate the security code template for your system for given UML diagram.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.