Some decision-making problems, i.e., multi-criteria decision analysis (MCDA) problems, require taking into account the attitudes of a large number of decision-makers and/or respondents. Therefore, an approach to the transformation of crisp ratings, collected from respondents, in grey interval numbers form based on the median of collected scores, i.e., ratings, is considered in this article. In this way, the simplicity of collecting respondents’ attitudes using crisp values, i.e., by applying some form of Likert scale, is combined with the advantages that can be achieved by using grey interval numbers. In this way, a grey extension of MCDA methods is obtained. The application of the proposed approach was considered in the example of evaluating the websites of tourism organizations by using several MCDA methods. Additionally, an analysis of the application of the proposed approach in the case of a large number of respondents, done in Python, is presented. The advantages of the proposed method, as well as its possible limitations, are summarized.
This paper presents a new method of steganography based on a combination of Catalan objects and Voronoi–Delaunay triangulation. Two segments are described within the proposed method. The first segment describes the process of embedding data and generating a complex stego key. The second segment explains the extraction of a hidden message. The main goal of this paper is to transfer a message via the Internet (or some other medium) using an image so that the image remains absolutely unchanged. In this way, we prevented the potential attacker from noticing some secret message hidden in that picture. Additionally, the complex stego key consists of three completely different parts (the image, the encrypted Delaunay triangulation, and the array Rk in Base64 code), which are very difficult to relate with each other. Finally, a few security analyses of the proposed method are conducted, as well as the corresponding steganalysis.
Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on the fuzzy commitment scheme and convolutional neural networks. One of its main contributions is a novel approach to automatic discretization of fingerprint texture descriptors, entirely based on a convolutional neural network, and designed to generate fixed-length templates. By converting templates into the binary domain, we developed the biometric cryptosystem that can be used in key-release systems or as a template protection mechanism in fingerprint matching biometric systems. The problem of biometric data variability is marginalized by applying the secure block-level Bose–Chaudhuri–Hocquenghem error correction codes, resistant to statistical-based attacks. The evaluation shows significant performance gains when compared to other texture-based fingerprint matching and biometric cryptosystems.
This paper analyzes the impact of multimedia content on success in learning to write and read the letters of the alphabet. For the research purpose and according to the ADDIE model of instructional design, a multimedia application was created for learning to write and read the letters of the alphabet. This paper describes the application interface display, which presents the functions and the parts of the program code. In the focus of the research are the technical possibilities for the use of multimedia application, as well as the impact of its use on the awareness of pupils and teachers on the importance of the introduction of multimedia teaching content. The main research was focused on the effectiveness of learning to write and read the letters of the alphabet and was carried out by comparing the performance of pupils at the end of the school year in two primary schools.Keywords: application; e-learning; education; improving learning. --- U ovom radu ispituje se utjecaj multimedijskoga sadržaja na učenje čitanja i pisanja slova. U svrhu istraživanja izrađena je multimedijska aplikacija za učenje čitanja i pisanja slova, prema ADDIE modelu instrukcijskoga dizajna. U radu je opisana aplikacija prikazom aplikacijskoga sučelja, opisom funkcija i dijelova koda. Istražene su tehničke mogućnosti korištenja multimedijske aplikacije kao i utjecaj njezine uporabe na svijest učenika i nastavnika o važnosti uvođenja multimedijskih nastavnih sadržaja. Glavno se istraživanje odnosi na uspjeh učenja čitanja i pisanja slova, a provedeno je usporedbom postignuća učenika na kraju školske godine u dvije osnovne škole.Ključne riječi: aplikacija; e-učenje; obrazovanje; poboljšavanje nastave.
A method of encryption of the 3D plane in Geographic Information Systems (GIS) is presented. The method is derived using Voronoi-Delaunay triangulation and properties of Catalan numbers. The Voronoi-Delaunay incremental algorithm is presented as one of the most commonly used triangulation techniques for random point selection. In accordance with the multiple applications of Catalan numbers in solving combinatorial problems and their "bit-balanced" characteristic, the process of encrypting and decrypting the coordinates of points using the Lattice Path method (walk on the integer lattice) or LIFO model is given. The triangulation of the plane started using decimal coordinates of a set of given planar points. Afterward, the resulting decimal values of the coordinates are converted to corresponding binary records and the encryption process starts by a random selection of the Catalan key according to the LIFO model. These binary coordinates are again converted into their original decimal values, which enables the process of encrypted triangulation. The original triangulation of the plane can be generated by restarting the triangulation algorithm. Due to its exceptional efficiency in terms of launching programs on various computer architectures and operating systems, Java programming language enables an efficient implementation of our method.
Phishing is a network attack in which attacker generates a replica of current legitimate site to contrivance the users into submitting their personal and sensitive information. A good anti-phishing solution should have rapid access time and rapid detection rate, but most of the existing solutions fail to satisfy it. A new method is proposed to prevent phishing attack which evaluates the URL Characteristics and cross check with the white-list. The proposed method has higher access time and higher detection rate than other methods. Whenever the user opens a website for the first time which is not available in the white-list, the algorithm proposed here examines the webpage using URL characteristics. The experimental results depict the accuracy of proposed method having accuracy of 93.8% with less negative rate.
: Secure remote user authentication is an authentication technique in which the remote server authorizes the identity of the user through an insecure communication network. Since then diverse remote user authentication schemes have been proposed, but each category has its advantages and disadvantages. Besides its strength and weakness, remote user authentication systems have a great impact on real-time applications such as E-health applications, telemedicine applications, Internet of Things (IoT), Cloud, and Multi-server applications. The implementation of the Tele Medicine Information System (TMIS) over public networks continues to disclose confidential information to unauthorized entities. Similarly, remote user authentication techniques have become essential in accelerating IoT as well. Security is a major concern in IoT because it allows secure access to remote services. Cloud computing services and a Multi-server environment share data among different end-users through the internet which also needs security as its paramount concern. Although intensive efforts were made in designing remote user authentication scheme for health care, IoT, Multi-server and cloud applications, the majority of these applications suffers either from security attacks or lagging of critical features. This paper presents an analytical and comprehensive survey of various remote user authentication techniques and categorizes them based on different applications. Furthermore, the state of art recent remote user authentication techniques have been compared, their advantages, key features, computational cost, storage cost, and communication cost are highlighted.
The environment in which the decision-making process takes place is often characterized by uncertainty and vagueness and, because of that, sometimes it is very hard to express the criteria weights with crisp numbers. Therefore, the application of the Grey System Theory, i.e., grey numbers, in this case, is very convenient when it comes to determination of the criteria weights with partially known information. Besides, the criteria weights have a significant role in the multiple criteria decision-making process. Many ordinary multiple criteria decision-making methods are adapted for using grey numbers, and this is the case in this article as well. A new grey extension of the certain multiple criteria decision-making methods for the determination of the criteria weights is proposed. Therefore, the article aims to propose a new extension of the Step-wise Weight Assessment Ratio Analysis (SWARA) and PIvot Pairwise Relative Criteria Importance Assessment (PIPRECIA) methods adapted for group decision-making. In the proposed approach, attitudes of decision-makers are transformed into grey group attitudes, which allows taking advantage of the benefit that grey numbers provide over crisp numbers. The main advantage of the proposed approach in relation to the use of crisp numbers is the ability to conduct different analyses, i.e., considering different scenarios, such as pessimistic, optimistic, and so on. By varying the value of the whitening coefficient, different weights of the criteria can be obtained, and it should be emphasized that this approach gives the same weights as in the case of crisp numbers when the whitening coefficient has a value of 0.5. In addition, in this approach, the grey number was formed based on the median value of collected responses because it better maintains the deviation from the normal distribution of the collected responses. The application of the proposed approach was considered through two numerical illustrations, based on which appropriate conclusions were drawn.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više