Open issues regarding the universal application of ATM for multiplexing and switching in the B-ISDN

Author(s):  
M. Decina
1995 ◽  
Vol 32 (1) ◽  
pp. 93-99 ◽  
Author(s):  
Donald Ian Phillips

On-site stormwater detention is widely used in Australia as a means of controlling the increased storm discharges from urban consolidation projects. However, unless the maximum permissible site discharge is correctly determined, the local piped drainage system may be overloaded. This paper presents a generic methodology that integrates detention storage behaviour with drainage design theory in such a manner as to protect the entire length of the downstream drainage system. Its generic nature facilitates its universal application to all systems, protecting these valuable community assets throughout their service lives.


Author(s):  
Mohd Dilshad Ansari ◽  
Ekbal Rashid ◽  
S Siva Skandha ◽  
Suneet Kumar Gupta

Background: image forensics deal with the problem of authentication of pictures or their origins. There are two types of forensics techniques namely active and passive. Passive forgery is also known as blind forensics technique. In passive forgery, copy-move (cloning) image forensics is most common forgery technique. In this approach, an object or region of a picture is copied and positioned somewhere else in the same image. Active method used watermarking to solve picture genuineness problem. It has limitations like human involvement or particularly equipped cameras. To overwhelm these limitations, numerous passive authentication approaches have been developed. Moreover, both approaches do not require any prior information about the picture. Objective: The prime objective of this survey is to provide an inclusive summary as well as recent advancement, challenges and future direction in image forensics. In Today’s digital era the digital pictures and videos are having great impact on our life as well as society, as they became the important source of information. Though earlier it was very difficult to doctor the picture, nowadays digital pictures can be doctored easily with the help of editing tools and internet. These practices make pictures as well as videos genuineness deceptive. Conclusion: This paper presents the current state-of- the-art of passive (cloning) image forensics techniques, challenges and future direction of this research domain. Further, the major open issues in developing a robust cloning image forensics detector with their performance are discussed. Lastly, the available benchmark datasets are also discussed


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Author(s):  
Joseph Canning

Late medieval Roman and canon law jurisprudence provided the origins of European notions of a universal rule of law in two senses: a legal order of universal extent and a structure of higher norms of universal application. Whereas modern international law is primarily concerned with the horizontal relationship between states, medieval jurists mainly considered the vertical relationship between universal and territorial powers. They developed de iure–de facto arguments to justify a plurality of sovereign states within an overall universal legal structure. Contributions to the elaboration of theories of just war were also made. We must be cautious about claiming that late medieval jurists contributed to the development of early international law as normally understood. Nevertheless, early-modern theorists of international law referred back to the work of their medieval juristic predecessors. A new research question is emerging about the usefulness of using the term ‘international’ in interpreting medieval jurists.


Sign in / Sign up

Export Citation Format

Share Document