The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is to compare GOMS evaluation results with analysis of HCI design of university webpage using eye-tracking technology. The evaluation process, methodology, operation codes and required time of GOMS user model are stipulated. Comparison suggests a close proximity between the results of GOMS evaluation and eye-tracking experiment, with a little deviation that could be affected by computer...
Streaming Feed has become one of the most used utility now-a-days. Starting from Home-Security to Business Surveillance, streaming feed is utilized everywhere. However, due to unstable network bandwidth, frequent buffering and delay occurrence usually creates degraded user experience. One of the ways to avoid this is to use Adaptive Bit rate Streaming. Among various protocols supporting this Adaptive...
Ontology, as one of the Protégé editing software, provides visualization functionality in the form of a plug-in. However, this has limitations due to it only illustrates the relation between super and sub classes. At the stage of develop Ontologies, it is helpful that able to see the class hierarchy and relationships using some kind of graphical tools to represent properties or restrictions linking...
Classification of web content is an interesting and widely pursued field of research in machine learning. Web classification could be done in various ways based upon the criteria chosen. Subjective classification involves classification of web pages based upon the subject to which these pages belong (say history, economics, politics, etc.). Another way of classifying web pages could be based upon...
Relevant information retrieval from the www mainly depends on the technique and efficiency of a crawler. So crawlers must be capable enough to understand the text and context of a link which they are going to crawl. Anchor text contains a very useful information to know about the target web page. Because knowledge about the target web page content helps the crawlers to decide their preferences of...
In the Data mining process the dispensation of in sequence can be done with dissimilar ideas. An optimization is the dilemma of penetrating out the paramount announcement from all the practical solutions. Artificial Bee Colony (ABC) is proposed which is based on intelligent advancement and is defined to get the powerful and reliable solution. Process scheduling algorithm is presented under distributed...
In the process of bag filter, the problem of bag was burned or hardened often occurred, which was caused of poor flue gas temperature control. So this paper analyzes the nonlinear relationship between temperature variations of mixed flue gas and flow in theory, and compares the advantages and disadvantages of different temperature control scheme. Aiming at the nonlinear and time-varying of controlled...
Shunt active power filter, when used with nonlinear loads, provides an elegant solution for reactive power compensation as well as harmonic mitigation leading to improvement in power quality. The present study deals with fuzzy logic control and neuro fuzzy control for Shunt active power filter. Neuro fuzzy logic has improved THD when compared to fuzzy logic controller and it is demonstrated through...
Particle Swarm Optimization (PSO) is an evolution-nary computation technique. Separate adjustment to inertia weight and learning factors in PSO undermines the integrity and intelligent characteristic in the evolutionary process of particle swarm to some extent, thus it is not suitable for solving most complicated optimization problems. On the basis of previous researches, the aim of this study was...
Network attack is a form of intelligent and sophisticated crimes in the web environment. Network based attacks are increasing at fast speed to hamper the smooth working of web resources. New style of Network attacks is a growing amount of indirect attacks that exploit network traffic, instead of directly manipulating a network resource. In recent time, damages from indirect attack are estimated to...
In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et al already developed Bit Level Encryption Standard ver-1, 2, 3, Bit level Multi way Feedback encryption standard. Recently Nath et al also developed 2-dimensional and 3-dimensional multiway feedback encryption standard. In the present...
In this paper, we propose a novel security system model for authorization, which refers to the immune system of human being, consisting of three defense-lines. The first line employs authentication techniques, which is the legal premise for subsequent authorization. In second line, blacklist techniques are adopted. Then, the final line is the adaptive immunity, which features the capability of learning...
The new era of information communication and technology (ICT), everyone wants to store/share their Data or information in online media, like in cloud database, mobile database, grid database, drives etc. When the data is stored in online media the main problem is arises related to data is privacy because different types of hacker, attacker or crackers wants to disclose their private information as...
The MANETs and UAV networks would soon replace existing Wireless technology due to its ease to deploy and bare minimum infrastructure requirement and dynamic topology. Emergence of vast high speed hand-held mobile devices, mail delivery drones, drone camera footage of a live cricket match etc, have reserved MANETs/UAVs in the reach of a common man. Therefore, it is imperative to address ubiquitous...
The performance of auto control system becomes higher in nuclear power plant (NPP), and the requirement of operation support system changes more advanced. So the inspecting parameters will become more and more, the sampling frequency will change higher and higher, the transmitting data will be produced more and more, the saving space will be demanded bigger and bigger. As auto control system in NPP...
Cloud computing very common technology today and the demands of cloud computing services are increasing day by day and thus data center management. This advance technology has a great effect on environment. The demand of electricity in data centers is increasing globally. Huge data centers consume large amount of power and most of it take place due to task scheduling, virtual machine allocation and...
As the development of the Cloud computing and Internet of Things, the standards of material life are continually improved. The requirements of safe, comfortable and convenient are also raised. In recent years, there are huge changes on the concept of family house on people's mind, and the smart home will be the trend of modern house. The research and development of it is about the automatic control,...
The main goal of data mining is to extract useful information from large amounts of database. However, data is often collected by several different sites. Among these, association rule mining has wide applications to find interesting relationships among attributes. In this paper we use concept of distributed database, when divided the centralize database into distributed database environment, database...
Hive is a data warehouse infrastructure tool to process structured data in Hadoop. It resides on top of Hadoop to summarize Big Data, and makes querying and analyzing easy. The Hadoop MapReduce framework speed up the execution of queries. This manuscript proposes the use of Multi Query Optimization (MQO) technique to enhance the overall performance of Hadoop/Hive. During simultaneous execution of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.