The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human iris can be used for detecting organ disorders based on iridology science. Nowadays, iridology diagnosis can be done automatically by computer using artificial intelligence approach. This research focused on cardiac diagnosis based on left iris map on clockwise direction around 2:00 to 3:00. The Principal Component Analysis (PCA) is used for feature extraction while the Support Vector Machine...
Stomach is a digestive organ which is the most vulnerable to diseases which are caused by the increased stomach acid production due to wrong diet. Many people sometimes ignore, even worse underestimate this, but if it's been ignored too long, it will lead to death. Thus it's necessary for routine check to determine whether there is disturbance in the stomach organ or not. One simple way to check is...
Along with the development of technology at this era, the need of Internet access service as a media of communication is increasing. This increasing led to anomalies in network traffic. These anomalies, can occur because of a Distributed Denial of Service (DDoS) that deliberately. The impact of an anomaly is to make the user cannot access the internet service. If left alone, these anomalies can be...
One of the most widely used multimedia data is Video on Demand. Video on Demand enables one to get diverse information easily and faster. However, this advantage is often misused currently. The less security of video is one of its problems. Video data can be pirated by any unauthorized person, harming the owners of the video data. To solve these problems, a security system with the cryptographic science...
Video on Demand (VoD) service have a concept that the user will have complete freedom to choose what he wants to see. VoD gives satisfaction is more personal than the interests of the people. The development of information technology through multimedia services such as Video on Demand cannot be separated from the issue of data security. Security is very important to maintain the data of those who...
Information security is an important aspect that must be maintained in order to obtain a successful business. However, financial difficulties and budget constraints create problems in selecting security countermeasures to maintain the network and running the system. Network administrators must rely on labour-intensive processes for tracking network configurations and system vulnerabilities, which...
Network administrators must rely on labour-intensive processes for tracking network configurations and vulnerabilities, which requires a lot of expertise and error prone. Organizational network vulnerabilities and interdependencies are so complex to make traditional vulnerability analysis become inadequate. Decision support capabilities let analysts make tradeoffs between security and optimum availability,...
In this research a brief explanation about basic theory of security metrics is given. Implementation of security metrics are also explained. A future work of security metrics fields are given as a guide to other researcher to make an advanced research in the future. A description of security metrics with global taxonomy and classification are discussed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.