The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opinion mining is an interested area of research, which epitomize the customer reviews of a product or service and express whether the opinions are positive or negative. Various methods have been proposed as classifiers for opinion mining such as Naïve Bayesian, and Support vector machine, these methods classify opinion without giving us the reasons about why the instance opinion is classified to...
Performance regressions, such as a higher CPU utilization than in the previous version of an application, are caused by software application updates that negatively affect the performance of an application.Although a plethora of mining software repository research has been done to detect such regressions, research tools are generally not readily available to practitioners. Application Performance...
Developers frequently employ Copy and Paste. However, little is known about the copy and paste behavior during development. To better understand the copy and paste behavior, automated approaches are proposed to identify cloned code. However, such automated approaches can only identify the location of the code that has been copied and pasted, but little is known about the context of the copy and paste...
In this paper we propose a new approach based on Symbolic Aggregate approximation (SAX), called improved iSAX to recognize efficient and accurate discovery of the important patterns, essential for time series data. The original SAX approach allows a very high-quality dimensionality reduction and distance measures to be defined on the symbolic approach and it is based on PAA (Piecewise Aggregate Approximation)...
In this paper we present a new method which allows us to detect the most informative features out of all data extracted from a certain data corpus. Widely used Pearson's coefficient is not reliable if the dependency between extracted features (input variables) and the objective function (output) is not linear. This approach is based on a modified random balance method (RBM) combined with non-parametric...
This paper deals with the estimation of rapidly time varying non isotropic Rayleigh fading channels in Space-Time (ST) coded direct sequence spread spectrum (DS-CDMA) systems. The effects of non isotropic scattering can be captured by using Von Mises distribution for the angle of arrival (AOA) of the scattered waves at the receiver. In order to benefit from the spatial diversity of ST coding, we need...
Cognitive radio networks are envisioned to solve the problem of spectral scarcity in wireless networks; through providing highly configurable radios and protocol stacks to support the application of a variety of efficient and possibly cross-layered solutions. However, the large numbers of hardware and software modules involved in realising these goals raises a fundamental design problem. Specifically,...
Intelligent service management techniques play an important role in the continuously and rapidly evolving area of technologically advanced services. High tech companies are looking for better ways to deliver and preserve services to their customers in a competitive way. This paper introduces a new architecture for a scalable service monitoring and support system called Call Home Analysis and Response...
Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host...
Intrusion detection systems have become a standard component of network security infrastructure now-a-days. So far, several IDS's have been proposed. And they all have there own limitations as well as advantages. But there has been not enough significant works to put them all together and discuss their merits and demerits in a comparative manner. So when new researchers try to have a research on this...
Computer networks are one of those unique gifts of modern science which enriched human life with the blessing of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network security has come into issue. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions typically start with intruders infiltrating...
With the progression of time, we have been blessed with the gifts of science. Computer networks are one of those gifts. But as the network proceeded, intrusions and misuses followed. Consequently, network security has come to the fore front and has become one of the most important issues. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions...
An intrusion detection system (IDS) that is destined to supervise an environment, must adjust itself according to every change in the environment and be handling every new attack occurrence. This feature is referred to as the adaptability. It makes the IDS a learning system in relation to its target environment, practicing an autonomous and continuous learning of new attacks. This paper develops a...
This paper presents the development of a power line carrier in low distribution automation system (DAS) for operating and controlling low voltage (LV) down stream of 415/240V. Supervisory Control and Data Acquisition (SCADA) based Remote Terminal Unit (RTU) along power line communication (PLC) system are used for DAS development that practically simulates the down stream distribution system functions...
This paper shows the practical demonstration of different factors that make it possible to overcome any shortcoming concerning the detection of broken rotor bar fault in the machines using the fault frequency components from the current, flux and instantaneous power signals under different levels of loading. Unlike previous studies that generally used single sensor type to detect broken rotor bar...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.