The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flood attacks are common threats to Internet, which has necessitated the need for visual analysis within an intrusion detection system to identify these attacks patterns. The challenges are how to increase the accuracy of detection and how to visualize and present the patterns of flood attack for early detection. In this paper, we introduce a Two-Density model that contains two coefficients: sending-density...
The internet is becoming more popular, and e-learning is in the same situation too, in this paper, the Mastery and Flow theory will be discussed. In the e-learning many people are involved in the digital content study?learning and etc., in the past few years, if learner want to catch a new knowledge or technology, he/she will spend a lot of time and fortune, but after internet and web skill become...
The purpose of this research is to design and implement an intelligent prediction system for manufacturing quality. 12 manufacturing factors are chosen from four categories of MEPH (Material/Equipment/Product/Human), through the sampling, features extraction, or features conversion system to present features of manufacturing system in this research. Then, we take quality samples composing by 12 features...
PHP is one of the leading Web development languages, however, the development model of existing PHP organizes without a structure, which mixes the code of data access, the processing of business logic , and Web presentation layer together, as a relult, it brought about many problems in the Web applications , meanwhile, it could not meet the rapid development of Web apply any more. In this paper, a...
In this research, users' access interests were introduced into the design of personalized search engine by using Web mining technology. Firstly, the users' access interest transactions were gained by interest algorithm via mining the users' logs. Secondly, it presents a method to compute session similarity of transactional unit and transaction and sets up an interest similarity matrix for clustering...
This investigation describes a novel design and implementation of an interactive multimedia mirror system, called "magic mirror". The magic mirror implemented in a personal computer is equipped with normal peripherals such as CCD camera, infrared ray devices, microphone, speakers, and an LCD monitor, which is further covered with a piece of general reflective glass. The magic mirror integrates...
Graph layout techniques have been developed for many years, there is a few applying to real world applications. This paper presents an application of applying graph layout techniques in Web information visualization and navigation. Most Web browsers, including Netscape and Microsoft Internet Explorer, cannot give users a visual "map" to guide their Web journey. An approach of using a graph...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.