منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملHiding Communication Latency in Data Parallel Applications
Interprocessor communication times can be a significant fraction of the overall execution time required for data parallel applications. Large communication to computation ratios of the tasks performed by these applications results in suboptimal performance when executed on data parallel architectures. We present an alternate architectural framework, referred to as concurrently communicating SIM...
متن کاملInformation Driven Evaluation of Data Hiding Algorithms
Privacy is one of the most important properties an information system must satisfy. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy when datamining techniques are used. Privacy Preserving Data Mining (PPDM) algorithms have been recently introduced with the aim of modifying the database in such a way to prevent the discovery of sensib...
متن کاملPredicting Type2 Diabetes Using Data Mining Algorithms
Background and purpose: Today, information systems and databases are widely used and in order to achieve higher accuracy and speed in making diagnosis, preventing the diseases, and choosing treatments they should be merged with traditional methods. This study aimed at presenting an accurate system for diagnosis of diabetes using data mining and a heuristic method combining neural network and pa...
متن کاملInformation Hiding in Parallel Programs Information Hiding in Parallel Programs
ions that together allow these decisions to be isolated and hidden. Virtual topolo-gies, virtual channels, and lightweight processes provide mechanisms for isolating mapping,communication, and scheduling decisions, while port arrays allow these techniques to beapplied to program components that must execute on many processors.In addition to describing the abstractions, we have s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF EDUCATION AND SCIENCE
سال: 2012
ISSN: 2664-2530
DOI: 10.33899/edusj.2012.58991