You are previewing International Journal of Information Technology and Web Engineering (IJITWE) Volume 10, Issue 3.
O'Reilly logo
International Journal of Information Technology and Web Engineering (IJITWE) Volume 10, Issue 3

Book Description

Organizations are continuously overwhelmed by a variety of new information technologies; many are Web-based. These new technologies are capitalizing on the widespread use of network and communication technologies for seamless integration of various issues in information and knowledge sharing within and among organizations. This emphasis on integrated approaches is unique to this journal and dictates cross platform and multidisciplinary strategy to research and practice.

This issue contains the following articles:

  • Research on Fault Diagnosis Method Using Improved Multi-Class Classification Algorithm and Relevance Vector Machine
  • Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart
  • A Study on Components and Features in Face Detection
  • A High-Capacity Covering Code for Voice-Over-IP Steganography
  • An Improved Multilinear Map and its Applications
  • An Additively Homomorphic Encryption over Large Message Space

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Special Issue on Advanced Algorithms for Efficient, Reliable and Secure Information Systems
  5. Research on Fault Diagnosis Method Using Improved Multi-Class Classification Algorithm and Relevance Vector Machine
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CLASSIFICATION PRINCIPLE OF RVM
    4. 3. OAOAR MULTI-CLASS CLASSIFICATION ALGORITHM
    5. 4. THEORETICAL AND SIMULATION ANALYSIS
    6. 5. INSTANCE STUDY OF FAULT DIAGNOSIS
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  6. Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CONTROL FLOW OF THE PROPOSED METHOD
    4. 3. HARDWARE IMPLEMENTATION
    5. 4. SECURITY AND RELIABILITY MODEL
    6. 5. DISCUSSION OF RESULT
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  7. A Study on Components and Features in Face Detection
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. DIVIDING FACE AND EXTRACTING FEATURES
    4. 3. MODEL ANALYSIS
    5. 4. CRF-BASED FACE DETECTION
    6. 5. EXPERIMENTS AND RESULTS
    7. 6. CONCLUSION AND FUTURE RESEARCH
    8. ACKNOWLEDGMENT
    9. REFERENCES
  8. A High-Capacity Covering Code for Voice-Over-IP Steganography
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUD AND PRINCIPLE
    4. 3. PRPOSED COVERING CODE
    5. 4. PERFORMANCE EVALUATION
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  9. An Improved Multilinear Map and its Applications
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PRELIMINARIES
    4. 3. CONSTRUCTION USING RANDOM MATRIX
    5. 4. COMMUTATIVE VARIANT
    6. 5. APPLICATIONS
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  10. An Additively Homomorphic Encryption over Large Message Space
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PRELIMINARIES
    4. 3. OUR HE SCHEME
    5. 4. ANALYSES
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  11. Call For Articles