In 1998, M. S. Baptista proposed a chaos based cryptosystem, which has attracted attention from the cryptography community. The Baptista cryptosystem uses the logistic map to generate chaotic sequence. The phase space of the logistic map, [Xmin,Xmax] - [0, 1], is divided into 256 equal subintervals and each 8-bit plaintext symbols is assigned to one of the subinterval. The encryption process of a given plaintext character consists of iterating the chaotic map until the state reaches the...
Since born of Internet at late of 1990s, corporate websites have become popular for almost any type of company no matter large, medium or small across the global. Almost every enterprise these days needs a website to communicate with customer, shareholder, partners, and others, to providing up-to-date information on enterprise, its products and services. Increasingly, commercial activities and order transactions are conducted on enterprise websites. 2.2 Web Content Management Evolution The Web...
Cellular text messaging services are increasingly being relied upon to disseminate critical information during emergencies. As a convenient and low-cost mobile communication technology, short messaging service (SMS) is experiencing very rapid growth. It is reported that 700 million mobile phone users worldwide sent 20 to 30 billion SMS messages every month in 2001. Cellular Text messaging permits individuals to transmit short alpha numeric communications for a wide variety of applications. The...
Web search engines are keys to the immense treasure of information. Dependency on the search engines is increasing drastically for both personal and professional use. It has become essential for the users to understand the differences between the search engines in order to attain a higher satisfaction. There is a great assortment of search engines which offer various options to the web user. Thus, it is significant to evaluate and compare search engines in the quest of a single search engine...
Abstract Nowadays massive multiplayer game is a famous platform of distributed system which consist up to millions of users and systems linked together. It is used for entertainment, online socialization, and many more activities by the users. As said, there are also various kinds of issues to come with the system. As there is no technologies with drawbacks, the increasing number user especially a hugely popular massive multiplayer online game which has millions of subscribers and limitation of...
Programming languages can be classified as either low-level languages or high-level languages. Low-level programming languages, or machine languages, are the most basic type of programming languages and can be understood directly by a computer. Machine languages differ depending on the manufacturer and model of computer. High-level languages are programming languages that must first be translated into a machine language before they can be understood and processed by a computer. Examples of...
Abstract- Mobile Wireless Sensor Network (MWSN) adds new design dimension to the existing MAC protocols due to the mobility of nodes. Collision probability and communication power consumption is increased in MWSN. In this paper, a hybrid MAC protocol which minimizes collision and achieves energy efficiency is proposed. Clustering of mobile nodes is done here and scheduled slots are provided by fusion nodes to each mobile sensor node during intra precinct communication. Contention based...
Cryptography Algorithm: One of the first audio watermarking algorithms that we developed (Paper I) is a time domain spread spectrum algorithm. It embeds a spread-spectrum-based watermark into an uncompressed, raw audio by slightly modifying the values of samples of the host audio in time domain. The main motivation was the development of an algorithm with a low computational complexity and with an embedding and extraction of watermarks in time domain. One of the most robust methods already...
Transmission Control Protocol, or TCP for short, is one of the big internet protocols used today. A protocol is a system of a format and rules for exchanging digital messages and we all use TCP for communicating over the internet every day. The other main internet protocol is the User Datagram Protocol or UDP for short. All these digital messages are constantly being sent and received as packets. In TCP, a host will send a request packet for establishing communication to the one it wants to...
Game has been the most amusement for people's daily routine and leisure time for long time. From the development of the computer game and computer network game in the last few years, we can see that game market has large demand. As well as the appearance of mobile gaming, it brings new vitality to the game market. Because it is not limited by the time and location, mobile gaming will be one of the most popular game in the worldwide. It is just a time problem. Usually most of mobile phones are...