The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
These days, handling complicated tasks has become an undeniable usage of real-time embedded systems. Also How to allocate resource effectively becomes an important issue. Utilizing real time device can be really useful in order to execute complex jobs those are needed to be scheduled. However, the authors tried to tackle overload situation in real-time systems by using HPIO (Hybrid PSO and IWO). The...
Many IT companies are faced with an alarming rate of risks in their businesses. This can be a result of lack of experiences to control re-occurrence and prevent new risks according to the previous projects experience. On the other hand, Corrective and Preventive Actions (CAPA) are known concepts for learning from experiences to avoid non-conformities. The successful implementations of CAPA in different...
Since the sensors collect personal medical data, security and privacy are important factors in wireless sensor networks. Due to small memory capacity, constrained power supply, limited computational capability and communications bandwidth of WSNs, applying key management in wireless sensor networks is hard to achieve. Energy is a central concern in the deployment of cryptographic techniques in WSNs...
Corrective and preventive action (CAPA) procedure in most organizations is merely used to log problems. These organizations do not implement a robust CAPA process, and as a result they are still struggling today with CAPA. Many firms have been using root cause analysis and corrective action program. A case study on a company which has long recognized that using a good root cause, corrective and preventive...
During the last few years, need for protection of computer networks from the outside world is evident. Connectivity of the computer networks to worked wide internet exposes them to many kinds of cyber crimes. Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved...
Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection Systems (IDS). Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.