The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: artificial intelligence; expert systems; human-computer interaction; security and access control; digital libraries; information visualization; P2P; peer to peer data management; information retrieval; information management; mobile, ad hoc and sensor network security; semantic Web; ontology; e-learning; ecommerce; e-business; e-government; Web mining; Web intelligence;...
Although there are many developed expert systems in the world, little consideration has been given to the impacts resulting from their use. There is a difference between the developed expert systems in the laboratories for research and demonstration and the expert systems that can be applied in the fields. The applied expert systems must cover the end users requirements and meet some other evaluation...
In the past, proprietary mainframe technology platforms provided a well defined architecture and environment, to build enterprise batch processing solutions. The businesses imperative today, is to develop similar solutions, using investments made in a varied mix of open systems technologies. Many of these technologies provide only a generic platform, not specifically targeted at enterprise batch processing...
This paper presents a simple, hybrid two phase global optimization algorithm called DE-PSO for solving global optimization problems. DE-PSO consists of alternating phases of differential evolution (DE) and Particle Swarm Optimization (PSO). The algorithm is designed so as to preserve the strengths of both the algorithms. Empirical results show that the proposed DE-PSO is quite competent for solving...
In this study, new approach based on brain emotional Learning process is presented to predict chaotic system more accurate than other learning models. So the main scope of this paper is to reveal the advantages of this learning model that imitate the internal representation of brain emotional learning model to provide a correct response to stimuli to state a purposeful predicting system. The convergence...
ldquoFollow-the-Trial-Fitterrdquo lets a shopper virtually try on different clothes by deforming clothing images to fit the shopperpsilas motion in real time without changing real clothes on her back. The existing virtual try-on systems enable changes of decoration and color, but they tend to be non-real-time, have limitations on the types of clothes, or use 3D character trial fitters, instead of...
Website information architecture (IA) has transcended into a discipline that is concerned with design principle and architecture of information in digital landscape. IA models in web-mediated environment however lack theoretical perspectives, empirical evidence and cultural context. In our effort to enlighten these aforementioned, we proposed the Web architectural-inducing model (WA-IM) for IA. We...
This paper proposes an optimization technique of gradient based genetic algorithm (GGA) to make a robust, efficient and real time face alignment application for embedded systems. It uses 2.5D Active Appearance Model (AAM) for the face search, the model is generated by taking 3D landmarks and 2D texture of the face image. 3D face alignment requires to optimize 6DOF (Degrees of Freedom) pose and appearance...
One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we describe an affective bi-modal educational system for mobile devices. In our research we describe a novel approach of combining information from...
One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we describe an affective bi-modal educational system for mobile devices. In our research we describe a novel approach of combining information from...
The concurrency control in distributed database management systems is an important research problem. Several concurrency control algorithms have been proposed for secure distributed database systems, and several have been and are being implemented. Most of the concurrency control algorithms are the variations of the following basic techniques: Two-Phase Locking, Timestamp Ordering and Serialization...
Recently, Phishing attacks have become a serious problem for end-users, online banking and e-commerce websites. Many anti-Phishing approaches have been proposed to detect and prevent Phishing. One of the approaches is the anti-Phishing tips published by many governmental and private organizations to help users detect and prevent the attacks by themselves. There are many different tips. This paper...
Network forensics technology with active and real time response characteristics is a new approach that can be used for investigation of network attack such as denial of service (DoS) attack. Once a system is compromised, the forensics and investigation is often always done after the attacks whereby some useful instant evidence is lost. The adaptive capture without loss of potential sensitive traffic...
One of the most significant difficulties with developing service-oriented architecture (SOA) concerns its security challenges. In particular, the authorization task is especially demanding because of the diverse access requirements within the various SOA environments, such as the business world, the academic setting and the industry atmosphere. In this paper, we propose a 4-attribute vector authorization...
The user-role and role-permission mappings are two of the most important process of the access control. Most of the present access control model lack of considering the time constraints. This paper presents a novel access control model with fine-grained time-constrains expressed by OCL (Object Constraints Language). First, we define several terms such as time points and time span which have flexible...
We describe a recommender system based on dynamically structured holographic memory (DSHM), a cognitive model of associative memory that uses holographic reduced representations as the basis for its encoding of object associations. We compare this recommender to a conventional user-based collaborative filtering algorithm on three datasets: MovieLens, and two bibliographic datasets such as those typically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.