scholarly journals Syntactic Analysis of Graphical Information Using Recursive Scoping

Author(s):  
Alexei Razumowsky

The report presents a new method for structuring, segmentation, and algorithmic design of the character array parser using VRML data as an example. The key feature of the method is the possibility of forming a hierarchically complex object by means of recursive data structuring, which allows you to cover the entire contents of the object, including its arbitrary nesting of child objects. This leads to a highly manageable development of the parsing algorithm, allowing you to focus each time on a specific piece of data, while not losing sight of the entire aggregate coherence of the information. The results obtained can easily be used in plans for creating convenient data storage structures related to information security, solving the problem of containing the amount of data in files, data management problems in heterogeneous systems, and hierarchical data solutions in the Internet of Things.

2021 ◽  
Vol 27 (4) ◽  
pp. 188-194
Author(s):  
D. V. Malakhovetsky ◽  
◽  
A. I. Razumowsky ◽  

Parsing character arrays by recursive scoping and structuring using the example of VRML data. The article presents a new method for structuring, segmentation and algorithmic design of the parser of character arrays using the example of VRML data. The key feature of the method is the ability to form a hierarchically complex object by means of recursive data structuring, which makes it possible to cover in aggregate the entire contents of the object, including its arbitrary nesting of child objects. This leads to high controllability of the development of the parsing algorithm, allowing you to focus each time on a specific piece of data, while not losing sight of the entire aggregate connectivity of information. The results obtained can easily be used in plans for creating convenient data storage structures related to information security, solving the problem of containing the amount of data in files, managing big data in heterogeneous systems, and processing hierarchical data in the Internet of Things. Keywords: data analysis method, parsing, structuring, se


2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


2020 ◽  
Vol 76 (11) ◽  
pp. 8529-8547
Author(s):  
Yuntao Duan ◽  
Jiangdai Li ◽  
Gautam Srivastava ◽  
Jyh-Haw Yeh

Author(s):  
ANDREAS DENGEL

The objective of this paper is to propose a syntactic formalism for space representation, which besides the well known advantages of hierarchical data structure, has the additional strength of self-adapting to a spatial structure at hand. The formalism is called puzzletree because its generation results in a number of blocks which in a certain order — like a puzzle — reconstruct the original space. The approach may be applied to any higher-dimensioned space (e.g. images, volumes). The paper concentrates on the principles of puzzletrees by explaining the underlying heuristic for their generation with respect to 2D spaces, i.e. images.


2014 ◽  
Vol 685 ◽  
pp. 684-689
Author(s):  
Xiang Fu ◽  
Xi Lu ◽  
Jing Wen

NC Turrets include Servo Turrets and Power Turrets. The structural differences of them are addressed. In this paper, data storage structures of turret parts, turret automatically assembled, finite element analysis, optimization design and 3D model browse in the WEB are studied. Based on the construction of B/S, a NC Turret rapid development platform which is composed by Network user tier, WEB business tier and Data tier is constructed. The platform integrates a CAE analysis module based on ANSYS, a parametric design module based on SolidWorks and a reliability analysis module based on MATLAB. The Rapid Development Platform can perform the new product design and reliability analysis, and an optimal develpoment design of NC Turrets can be realized rapidly and efficiently.


2013 ◽  
Vol 373-375 ◽  
pp. 723-726
Author(s):  
Ying Peng ◽  
Fang Wang

This paper proposes a new integration technology for RFID data by using XML£¬EPC tag and metadatabase. It solves the problem of data storage and sharing between the RFID systems and enterprise applications. And it can be used to achieve integration with other industries heterogeneous systems.


Sign in / Sign up

Export Citation Format

Share Document