The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the technology trend in the recent years uses the systems with network bases, it is crucial to detect them from threats. In this study, the following methods are applied for detecting the network attacks: support vector machine (SVM) classifier, artificial Neural Networks (ANN), and Genetic Algorithms (GA). The objective of this study is to compare the outcomes of GA with SVM and GA with ANN and...
Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able...
Cloud computing is the next generation computer system which extends network architecture into dynamic and large scale capacity by using visualization techniques. Transparent and secure data provenance will enhance the level of trust in the Cloud. Recent literature on securing data provenance focuses only on providing partial part of security elements in their mechanisms, thus they could not provide...
Network traffic data is communication data of user on the network. It is a large data and it also consists of normal and abnormal pattern behavior. The analysis and detection of the abnormal pattern behavior in the network traffic data must spend a long time and very hard to find the intrusion pattern. However, the data mining technology can be utilized to extract normal and abnormal pattern behavior...
Currently, collaborative environments offer unlimited data sharing for users. Data owners are poorly involved in handling their data for such environment when it deals with data policy. Normally, data access control policy consists of a resource and authorization descriptions which are assigned by the administrator. It is the responsibility of the administrator to set and specify the policy for application...
The huge and fast development in all our life aspects motivated the system designers to increase system performance and in the same time decreasing the cost and power consumption. FPGAs based embedded systems can provide the equilibrium between many critical concepts like, performance, rapid time to market, and flexibility, so they have become the preferred source of computation in many critical embedded...
This paper share in details the experiences gained during the development of a Virtual Reality application for a stress treatment. Throughout the twelve months development period, authors have faced numerous challenges and difficulties. Those challenges are encountered while setting up an open source game development platform called Cryengine and while integrating this engine with VR gadgets such...
Emerging applications such as Web 2.0 and linked data has significantly contributed to the volume of data on the Web. Web 2.0 applications are dynamic in nature, and require frequent and real time update. However, substantial progress in the management of RDF data is focusing on speeding up query processing on the so called static data, such as the linked data. Approaches that are focusing on the...
Data, both structured and unstructured, is increasing exponentially daily. This valuable data is important to businesses, society, and other organisations in order to compute more accurate analysis, and eventually, make better judgement. In order to handle huge data, many have turned to co-processors like GPUs or Intel MIC to further accelerate their computation. In this study, we present performance...
Eye movement can systematically facilitate the detection of brain activities for the discovery of neurologic diseases. However, the traditional techniques such as electrooculography requires expensive equipments, technical handling skills and fairly invasive. This research work aims to test the validity of the low-cost smooth pursuit experimental setup to track eye movement when presented with different...
According to World Health Organization, coronary artery diseases are responsible for 17% of the death in the world. Diagnosing the disease in the right time could lower the danger that it may cause. This paper presents an expert system (CardioOWL) that has the ability to diagnose any kind of coronary artery diseases. CardioOWL supplies the expert with the diagnosing strategies that could be used and...
Browsing web through smartphone browsers is gaining popularity due to the convenience and availability of infrastructure at almost all places. On the other hand the capabilities of smartphone browsers are also improved to a great extent and many browsers are available to users. One can perform almost all of his information seeking and web related tasks through smartphone browser. Many web sites are...
Literature reports that educational programs tend to favor knowledge conformation rather than knowledge construction; however, Computer Supported Collaborative Learning (CSCL) is a powerful pedagogical strategy that encourages students to focus more on their knowledge construction. In this paper, we will discuss on the purpose of this study which is to observe the characteristics as the CSCL learning...
Money laundering refers to activities that disguise money receive through illegal operations and make them become legitimate. It leaves serious consequence that may lead to economy corruption. Extensive research has been conducted to investigate proper solution for suspicious transactions detection. In the realm of clustering approaches, traditional research only concentrate on k-means as the best...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.