Learn More
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software. This paper examines the use of opaque predicates as one of the building blocks of obfuscating(More)
Information monitoring is a very essential activity for management, control and decision making in various applications. This paper proposes an intelligent system for monitoring information sources that consists of many adaptive agents cooperate with each other in order to monitor every information item updates at the right time without over loading of(More)
The wide usage of the Internet and the availability of powerful computers and high-speed networks as low-cost commodity components have a deep impact on the way we use computers today, in such a way that these technologies facilitated the usage of multi-owner and geographically distributed resources to address large-scale problems in many areas such as(More)
Today, with the fast development of Extensible Markup Language (XML) and increasing amount of data that is published in the form of XML, copyright protection of these data is becoming an important requirement for numerous applications. This study is proposing a system that uses fingerprinting to trace illegal copies and detect any modification made to an(More)
Sign language recognition (SLR) has spawned more and more interest in human--computer interaction (HCI) society. The major challenge that faces SLR recognition now is developing methods that will scale well with increasing vocabulary size with a limited set of training data for the signer independent application. The automatic SLR based on hidden Markov(More)