Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Information Security Awareness (ISA) is a considerable break in the wall of information security. People may show different level of awareness for security threats based on their knowledge, behaviour and culture. In Saudi, studies showed that employees are less aware to security risks due to lack of knowledge and the demanded culture. This paper presents the influence of students' knowledge on their...
This paper is present a modified Bayesian Network (BN) for Full Bayesian Classifier (FBC) for used it to diagnoses the condition of a patient from some of symptoms and medical history. The conditions are the heart diseases and the nervous diseases. Modified for FBC is depended on common structure known as naïve Bayes. Determining the network structure is D-separated by the variable...
The proposed system discuss a text summarization system over the social web site. The proposed system works by assigning scores to sentences in the document to be summarized, and using the highest ranking sentences in the summary. Highest ranking values are based on features extracted from the sentence. A linear combination of feature scores is used. In addition to basic summarization, some attempt...
In this paper, we present an efficient scheme of color image steganography based on Mix Column Transform (MCT) on specified blocks selected according to secret key and hide the secret message within those using logical X-OR operation. Our experiments show that the security can be increased by following this method since it uses irreducible polynomial mathematics within its operational method. The...
Software maintenance is an ongoing process during the lifetime of an information system. Once it is on production the information system must evolve due to the operating environment changes, when new anomalies uncovered or when new user requirement arises. Prior to any software evolution, decision-making need to be undertaken by the organization's IT decision makers whether to proceed with the evolution...
Teaching and learning for software design course at universities demands a sufficient supervision from the educators (e.g., instructors, lecturers, teachers, mentors and others) and also active communications between students and lecturers. With adequate practice of software design problems/exercises, it can enhance students' knowledge in software design. A good software designer requires both the...
The transformation of mobile devices from being a communication devices to be important information resources has changed the way of how activities being implemented including in tourism industry. This is very important for the tourists especially when they visit remote location such as forests. For these tourists, information regarding plants is very important to them and most of the time the tour...
This study focuses on determining the method for constructing phylogenetic tree from genetic dataset of various species. The genetic tree construction process requires Multiple Sequence Alignment (MSA) to align the genetic dataset. As the size of genetic database grows, MSA has become the bottleneck of the process. The best phylogenetic tree construction needs a good MSA method to align genetic dataset...
Improving autonomous agents' awareness has aroused a great deal of interests in agent research. The objective is to formulate an approach that provides advanced awareness capabilities in the agents' behaviour. In this paper, we explore the techniques proposed in the literature that have been adopted to enable agents' awareness which are Active Perception (AP), Situation Awareness (SA) and Context...
The Internet Control Message Protocol (ICMP) attack is an example of a DDoS attack and regarded as an Internet menace that aims to deny service to legitimate users by violating the availability of resource in a system. A number of researches have been conducted to propose different methods of mitigating the attack but yet, the problem still arises. Thus, to improve the current mitigation solution,...
AR.Drone is a remote-controlled quad-rotor helicopter that is operated by computer instruction. Because communications between AR.Drone and a computer are complex, it is difficult to program AR.Drone software. Existing software development kits (SDKs) reduce those complexities, however, SDKs have many limitations. They can be difficult to use because the structure is too complex to understand, or...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.