The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversity in the sharing methods. Most of the times, information is stored in different proprietary formats, complying...
System architecture of distributed enterprise data warehouse should ensure quality attributes such as separation, scalability, extensibility, security, and manageability. However, all existing distributed enterprise data warehouse system architectures have failed to address security at the architecture level. We propose that adding a virtualized proxy component to the system architecture will greatly...
We present our investigation that could increase the safety of infrastructures by preventing biological and chemical attacks from terrorists. We surveyed the buildings of our campus using infrared (IR) technology then assessed for faults and cavities. These energy leaks can be used as prime points in which terrorists inject the lethal chemicals into the buildings. Also if a terrorist is biologically...
Fuzzy reasoning analysis (FRA) is known as a mathematical programming approach to strong nonlinear system prediction,In this paper,the design and implementation of a fuzzy reasoning based cyberspace security awareness model is presented. The new feature of the this method is that it can give better perception and projection of cyberspace security situational. We show that this new method, referred...
Emergencies and disruption events bring new challenges to disruption management, a new analysis method is presented in this paper to search the solution, through the analysis of situational awareness, reasons of trend and changes of disruption events in different stages get the impact to whole supply chain become clear, this paper also provides the idea of situational awareness indexes system construction,...
Economic development level has important effect on the institution. And economic development is an adjustment process of stock variable. Thus, it is difficult to achieve desired results for the institution transplanting. Under different conditions and during different period, the relationship between the institution and economic development is different. A theoretical model on causal relationship...
Statistical models have been widely used in public health and made a difference in a wide range of applications. For example, they provide new ideas for efficient feature selection. This paper attempts to demonstrate how to apply regression-based methods to accurately predict in-hospital mortality of Methicillin-resistant Staphylococcus Aureus (MRSA) patients. Logistic regression is used to predict...
A multivariate process monitoring and fault identification model using decision tree (DT) learning techniques is proposed. We Use one DT classifier for process monitoring and other p (p is the number of the variables) DT classifiers for fault identification. The Mahalanobis distance contours based method for selecting model training samples is proposed to decrease the number of training samples. Numerical...
Harmonic rule is popularly used in machine setup adjustment problems introduced by Grubbs (1954). The algorithm is optimal when the disturbance process is white noise and the initial process bias is an unknown value. When the initial process bias is assumed to be a random variable with a priori distribution, Grubbs' extended rule is optimal when the disturbance process is white noise. This paper considers...
To study the influence factors of aluminum alloy Fretting fatigue life, the global finite element model is employed. The effectiveness of the model is validated according to the comparison of analytical solutions and numerical solutions. A new fretting fatigue life prediction model has been proposed base on friction work. The rationality and effectiveness of the model are validated according to the...
In industrial statistics, the degradation test is regularly used in the analysis of product reliability. This paper is focused on the modeling of accelerated degradation test with longitudinal observation under constant stresses with Berkson-type measurement errors, and suggests the minimum distance estimator for the parameters in the model. The consistency and asymptotic normality of the estimator...
In order to get the prediction of dyeing concentration on the value of fabric color, this paper establishes the mathematical model of RGB value and dyeing concentration based on the measured data. And then the minimum error average fitting method is used to calculate the function to get the prediction. The Newton iteration method is also used in solving the equation after the measured RGB data is...
Modern business activities rely on extensive email exchange. Various solutions attempt to analyze email exchange in order to prevent emails from being sent to the wrong recipients. However there are still no satisfying solutions; many email addressing mistakes are not detected and in many cases correct recipients are wrongly marked as potential addressing mistakes. In this paper we present a new approach...
In this paper, we have analyzed terrorist financing. In particular, we have examined the financing of the Al Qaeda finance network and determined how information technologies may be used to extract information from this network.
Rapid development of social network theory provides new perspective for the study of behavior of terrorist organizations. Due to the covertness of terrorist activities, the absence of individuals and relationships often occurs in the construction of interpersonal relationship network of terrorists using social network theory, thus affecting the effectiveness of analysis. This paper proposes a method...
Many security-related applications can benefit from constructing models to predict the behavior of an entity. However, such models do not provide the user with explicit knowledge that can be directly used to influence the behavior for his/her interest. This type of knowledge is called actionable knowledge. Actionability is a very important aspect of the interestingness of mined patterns. In this paper,...
Discovering and characterizing emerging topics and trends through analysis of Web data is of great interest to security analysts and policy makers. This paper considers the problem of monitoring social media to spot emerging memes - distinctive phrases which act as “tracers” for discrete cultural units - as a means of rapidly detecting new topics and trends. We have recently developed a method for...
We propose a secure approximate comparison protocol and develop a practical privacy-preserving two-party k-means clustering algorithm over vertically partitioned dataset. Experiments with to real datasets show that the accuracy of clustering achieved with our privacy preserving protocol is similar to the standard (non-secure) kmeans function in MATLAB.
We propose a criminal identity resolution technique that utilizes both personal identity and social identity information. Guided by existing identity theories, we examine three types of identity features, namely personal identity attributes, social behavior attributes, and social relationship attributes. We also explore three matching strategies, namely pair-wise comparison, transitive-closure, and...
Combined with the changes of the government online information management and service in recent years, the paper discuss the Development and Current Status about Government online information resource management, service quality and service standards, availability and proposed to increase government online information management and service concerns from the theoretical and practical.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.