The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Design-level vulnerabilities are a main source of security risks in software. To improve the reliability of software design, this paper presents a modified threat-driven modeling framework, to determine which threats require mitigation and how to mitigate the threats. To specify the functions and threat mitigations of a security design as a whole, aspect-oriented Stochastic Petri nets are used as...
There is a more challenging demand nowadays for software organizations to deliver high quality product on time with low budget. Software processes help them achieve this goal, gain their customer satisfaction, accomplish competitive advantage and satisfy their shareholders financial demands. Agile and traditional development approaches divided the software market into two competing parties, each legitimately...
Cloud Computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers' Quality of Service (QoS) requirements. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for...
As a mean for liver investigation, abdominal CT images have been widely studied in the recent years. Processing CT image includes the automatic diagnosis of liver pathologies, such as detecting lesions and following vessels ramification, and its 3D volume rendering. The first step in all these studies is the automatic liver segmentation. This paper presents a fully automatic method to segment the...
Access control is one of the most security requirements that face some challenges in multiagent systems due to agents' autonomy, distribution and communication with strangers. Unlike current access control mechanisms applicable to traditional distributed systems, trust management model provides a more flexible and dynamic access control approach suitable for the nature of multiagent systems, since...
Nowadays, rules make part of any software system including real-time applications and games, meanwhile an event can trigger many different rules according to the conditions controlling these rules. Although rules are core part to many kinds of systems, its maintenance and update are not easy without affecting the whole application. Hence, many systems have presented rules as a separate layer from...
Since a large amount of information is added onto the internet on a daily basis, the efficiency of peer-to-peer (P2P) search has become increasingly important. However, how to quickly discover the right resource in a large-scale P2P network without generating too much network traffic and with minimum possible time remain highly challenging. In this paper, we propose a new P2P search method by applying...
Knowledge Discovery in Databases (KDD) is a complex interactive and iterative process which involves many steps that must be done sequentially. Supporting the whole KDD process has enjoyed a great popularity in recent years, with advances in research. We however still lack of a generally accepted underlying framework and this hinders the further development of the field. We believe that the quest...
NLP search takes a long amount of time due to large size of corpus, besides there are too many hits at the server. At present, the strategy to deal with search engines is to have many thousands of servers in order to provide real-time searches. Fast alternatives are therefore sought. In this paper, we present a pioneering work in this direction by taking word stemming, a crucial aspect of search and...
Ramsey Theory studies the existence of highly regular patterns within a large system and proves that the complete disorder doesn't exist. The role of Ramsey numbers is to quantify some of the general existential theorems in Ramsey theory. The Ramsey number R(m, n) is the smallest integer r such that a simple graph of r vertices has either a clique of size m or an independent set of vertices of size...
Many techniques have been developed to solve biclustering gene expression datasets problem by minimizing the crossings in the input matrices like cHawk [1] and Bimax [9]. The usage of local searching techniques-in the step of Crossing Minimization (CM)-causes some limitations that affect the accuracy of the obtained biclusters. In this paper, Crossing Minimization Biclustering Algorithm (CMBA) is...
This paper deals with the comparison of the two neural network methods of learning: supervised (classical feedforward neural networks: multi-layer neural networks (MLP), radial basis function (RBF) and probabilistic neural networks (PNN)) and unsupervised (self organizing feature maps (SOFM), or Kohonen map), in order to assess their performances on a labeled breast cancer database. By revealing their...
Particle Swarm Optimization (PSO) is an efficient, simple and fertile Optimization Algorithm. However, it suffers from premature convergence; moreover, the performance of PSO depends significantly on its parameters settings. PSO attracts attention from researchers; they try to improve algorithm performance and avoid its weakness. In this paper, we propose a new methodology that uses chaotic agents...
This paper presents a comparison between two stochastic, population based and real-valued algorithms. These algorithms are namely Differential Evolution (DE) and Particle Swarm Optimization (PSO). These algorithms are used in the training of feed-forward neural network to be used in the prediction of the daily stock market prices. Stock market prediction is the act of trying to determine the future...
Deoxyribonucleic acid (DNA) is a nucleic acid that contains the genetic instructions used in the development and functioning of all known living organisms and some viruses. Our proposed approach for DNA clustering depends on an algorithm for clustering DNA sequences using self-organizing map (SOM) technique. The main objective of this paper is to analyze biological data and to bunch DNA to many clusters...
This paper presents a dynamic self-organizing design for a server cluster that supports multiple services with different priorities. Our system dynamically allocates jobs to servers in a server cluster, while maintaining certain QoS objectives for each service. A "Local leader" is dynamically set up for each service, and it controls the membership of its service, and thus the cluster size...
This paper presents an Ant Colony Optimization Approach (ACO) to solve the shortest path problem, especially with fuzzy constraints. The proposed algorithm consists of five sequential steps. The first step is to determine the number of possible paths from the source to the target. The second step calculates the probability of each path of possible paths. The third step calculates the expected number...
In the tight-coupled next generation heterogeneous wireless networks, a user with a multi-interface terminal may have network access for different service providers using various technologies. Radio network selection (RNS) is the mechanism which decides how to select the most suitable access network (AN) based on the discovered accesses, QoS constraints, operator policies, user preferences and available...
Choosing the right counterpart can have a significant impact on negotiation success. Unfortunately, little research has studied in such negotiation counterpart decisions. The purpose of this study is to develop negotiation agents that can behave rationally so as to improve the final outcomes, these agents employ support vector machine empowered by genetic algorithm with the same strategy used before...
Natural Language Interface to database NLIDB applications achieve great success when dealing with simple user requests, however most of NLIDB applications fail dramatically when users issue indirect or sophisticated requests. One modern approach to enhance NLIDB is using Ontology. Ontologies are very helpful when used with Natural Language Processing applications for supporting extraction of relevant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.