The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The digital data collected in current live forensics is always suspected in terms of integrity and fidelity when viewed as evidence. In this work, trustworthiness of evidence obtained from physical memory image is studied. The trustworthiness of evidence in physical memory image can be addressed as how closely the memory image accurately or truthfully represents the real memory of the target machine...
Economic behaviors of the economic system, including products priced and the price of E-commerce, can be attributed to economic equilibrium problems which research the price which both the supply and demand can accept in the market economy. The existence of solutions for economic equilibrium in finitely continuous topological spaces is presented without linear and convexity structure. Some result...
Intuitionistic fuzzy theory is an excellent tool to represent uncertainty and vagueness in fuzzy multi criteria decision making problems. When intuitionistic fuzzy numbers are used to express fuzzy information, they need to compare with each other to indicate the relative importance or priority. This paper reviews an existed method of ranking two intuitionistic fuzzy numbers, and further defines another...
The popularization of computer applications has prompted us to research into the teaching experiment and curriculum design on computer English curriculum reforms both in computer and correlative majors and in non-computer majors at two different levels. In the research, four parts of curriculum structure, known as curriculum objectives, curriculum contents, learning resources and learning models have...
We know that the goal of education as requested by IT society was fully achieved by the application of collaborative research-based learning (CRBL in short) through organizing teaching experiments. It can effectively express CRBL function by designing the structure of networked CRBL community (original research) and developing this community according to the model of learners and facilitators in CRBL...
We know that the goal of computer education was fully achieved by the application of project-based cooperative learning (PBCL in short) in computer education through organizing teaching experiments. Making full use of student's computer-oriented information technology in PBCL has more advantages than applying it to other subjects. Only by wholly expressing its advantages, adopting the right way, designing...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.