The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With rapid innovations and growing Internet population, petabytes of information are being generated every second. Processing these enormous data and analysing is a tedious process now-a-days. The amount of data in real-time is growing tremendously. Nearly 80% of the data is in unstructured format. Analysis of unstructured data in real-time is a very challenging task. Existing traditional business...
The article deals with the task of identifying the elements of the information influence in messages of social networks. Structural-logical scheme of solving the problem is described. We consider the cognitive aspects and approach to building patterns of network messages that contain the elements of information influence. It is presented scheme of weighting terms in network messages and the method...
At a time when the media constantly reports about new sophisticated attacks, organizations of any business and size need to be prepared for such attacks against their IT infrastructures. To reflect the attacks organizations should have a properly designed information security (IS) management system with adequate documentation support. Among the most important documents, there are IS policies for different...
This paper deals with the object detection, recognition and categorization taking into account its ability to convert into some other object. This is possible when the object variance includes an individual ability to change one or more of its properties within some fixed computational framework. The potentially convertible individuals are gathered into the variable domains, in turn. The variance...
Cloud computing as a new and popular IT-based technology is a large-scale distributed computing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities...
Gaze estimation is the process of determining the point of gaze in the space, or the visual axis of an eye. It plays an important role in representing human attention; therefore, it can be most appropriately used in Human Computer Interaction as a means of an advance computer input. Here, the focus is to develop a gaze estimation method for Human Computer Interaction using an ordinary webcam mounted...
The main course of preliminary natural texts processing is tagging and disambiguating texts. Hence, most of modern language tools are specified for such purposes. In our projects, we carry out a shallow syntax of untagged texts. For this purpose we developed a new query language based on regular expressions. This language allows write queries according to words' ambiguity.
In this paper we propose a new architecture of a smoothing filter in the RNS. The problem of computationally complex division operation performing is solved by replacing this operation by division with the remainder. This makes it possible to replace the division by subtraction and a multiplication in the RNS when using RNS modulo as a divisor. Simulation of smoothing filter hardware implementation...
The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding. In this paper we present mobile threats and some of the main attack vectors that hackers use to...
Big data analytics are very fruitful for solving problems in cybersecurity. We have analyzed modern trends in intelligent security systems research and practice and worked out a syllabus for a new university course in the area of data mining and machine learning with applications to cybersecurity. The course is for undergraduate and graduate students studying the cybersecurity. The main objective...
In recent pattern matching architecture researches, there has been much attention to high-throughput implementations with reconfiguration on the fly on FPGAs as well as ASICs. In this paper, we propose to use self-organizing approach to synthesize two-dimensional map (cluster) of a simple processing units with lateral links for fast pattern matching of one-dimensional input event. We suggest scalable...
The authors analyze some major problems of developing competent human resources, first of all legal experts, in the electronic commerce (e-commerce) legal protection sphere. To date, the educative process has been evolving mainly around technically- or economically-oriented academic programmes; however, in actual practice there is a strong demand for an integrative approach to education that implies...
In this paper, we propose a network anomaly detection system which consists of a Maximal Information Coefficient based feature selection algorithm and a feature-based MSPCA detection algorithm, which can separate the anomalous information more efficiently. Maximal Information Coefficient can provide a good information measurement of any dependency between two random variables. MSPCA combines the benefit...
A very new issue in current age of marketing is mobile advertisement to which there is a little recognition on its effectiveness. Ignoring users' interests and needs as well as sending huge volume of mobile advertisements leads into wasting advertisement investment. Firms should utilize different strategies to design and send mobile advertisement. The developed model for this study considers affecting...
With the exponential growth of information communication technology (ICT), cybercrimes have grown equally, culminating in investigation, solving such crimes and prosecuting the criminals. This article presents a proposal for the education, training and certified qualification of Brazilian police officers in order to prepare them so that they can be as knowledgeable, reliable, efficient and effective...
In cloud computing, the paradigm of data outsourcing introduces security challenges, which requires an independent auditing service to check the data integrity in the cloud. Many existing integrity checking protocols cannot be applied to the auditing service because they can only deal with static data, but it is natural for the client to dynamically update their remotely stored data. Thus, an efficient...
The article describes the probabilistic model of a cryptosystem, that provides getting different from each other cryptograms in case of multiple encryption of the same source text. The model is realized by the insertion of the initialization vector into the block scheme of the encryption algorithm, that is sent to the recipient encrypted together with the cryptogram of the source text. The article...
Based on DIVA(Directions Into of Articulators) model, the paper attempts to construct a neural network model which can better simulate speech perception, speech acquisition and speech production. The model classifies speech phonemes from formant frequencies by unsupervised learning, and through the modifications of DIVA model speech mapping and self-organizing mapping algorithm, it simulates the natural...
The paper discusses identification of core disciplines for the most effective development of basic professional competences set forth by “Financial monitoring specialist (in the area of anti-money laundering and combating financing of terrorism)” professional standard. It builds on an earlier effort to translate the capabilities of the professional standard into educational standard competences and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.