Loading...
  • Home
  • Search Results
2275-2276 of 4327 Papers

AN ENTROPY-BASED SIGNAL RESTORATION METHOD ON GRAPHS

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): JIANJIA PAN , XIANWEI ZHENG , YUAN YAN TANG

Abstract: This paper proposes an entropy-based best tree decomposition and reconstruction method for signals on graphs. A recently popular method for graph signal decomposition is to down-sample and filter a graph signal by low-pass and high-pass filters, then iterate decomposition on every low-pass component. This method is not well-suited for graph signals with significant high frequency components. We propose a new method to decompose a graph signal according to an entropy based best tree decomposition scheme. This method is adaptive for graph signal decomposition, and it gives more accurate and robust representations for graph signals. The proposed decomposition method is shown to provide an efficient representation well-suited for graph signal compression, or graph-based image compression. The performance of the proposed method is validated by real-world graph signal recovery problems. The new method also achieves better performance than the existing wavelet-like decomposition in graph-base

  • Publication Date: 11-Oct-2015
  • DOI: 10.15224/978-1-63248-064-4-22
  • Views: 0
  • Downloads: 0

EXPLORING THE SQL INJECTION VULNERABILITIES OF .BD DOMAIN WEB APPLICATIONS

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): DELWAR ALAM , TANJILA FARAH , MD. ALAMGIR KABIR

Abstract: Web applications have been proven most efficient by providing easy access to services such as online education, banking, reservation, shopping, resources, and information sharing. Though the use of web applications is a comparatively new concept, various government and private organizations of Bangladesh have started getting accustomed to it. Bangladesh government has also taken initiative to support web based services and ensure their security and reliability. Most of the web applications of Bangladesh are registered under .bd domain. The global accessibility and sensitivity of the information’s of web applications make them a target for web attackers. However the security issues of the .bd domain web applications are not addressed. No through study has been done so far on the existing vulnerabilities of these web applications. Hence the web applications are vulnerable to basic attack such as Structured Query Language injection (SQLi). This paper presents an evaluation of existing Use

  • Publication Date: 11-Oct-2015
  • DOI: 10.15224/978-1-63248-064-4-23
  • Views: 0
  • Downloads: 0