The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Prediction in the stock market is challenging and complicated for investors. Many researches have performed to sense the future market movements. In the stock market, social media data have high impact today than ever. In this work, various prediction algorithms are analyzed to build a prediction model. The prediction model will be based on monthly prediction and daily prediction to forecast the next...
A web service composition is a procedure of bringing together several web services to accomplish the business process. Colored Petri Nets (CPN) model has been widely used in both model based testing and verification of design correctness of web service composition. In this paper the existing approaches that uses CPN model for design verification of the web service composition are analyzed.
Due to increase in the mobile users in a cell site, the operators are insisted to provide good coverage in terms of speed and coverage even in the cell edges. This leads to higher connectivity and operative of the mobile station, which requires higher energy to perform this task efficiently. A lot of cash inside the cell networks is being wasted, especially in the network's RBSs, in the form of electricity...
Groups are the main entities that form the crowd. So understanding group level properties is vital and practically useful in a wide range of applications, especially for crowd abnormality detection. This paper aims to address the problem of modeling different behaviors captured in surveillance videos for the applications of normal behavior and abnormal behavior detection. A novel framework is developed...
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. OpenStack lets users deploy virtual machines and other instances which handle different tasks for managing a cloud environment. A cloud usually possesses profound resources, and has full control and dynamic allocation capability of its resources. Cloud offers us the...
Lung cancer is the most common cancer for death among all cancers and CT scan is the best modality for imaging lung cancer. A good amount of research work has been carried out in the past towards CAD system for lung cancer detection using CT images. It is divided into four stages. They are pre-processing or lung segmentation, nodule detection, nodule segmentation and classification. This paper presents...
The denial of service attack is the most powerful damaging attacks used by hackers to harm a business or organization. This attack is one of most dangerous cyber-attacks. It causes service outages and the loss of millions, depending on the time of attack. In past few years, the use of the attack has enlarged due to the accessibility of free tools. This tool can be blocked simply by having a good firewall,...
Software refactoring is a crucial and necessary activity for the quality enhancement during maintenance and evolution of a software system. Stability is a key quality aspect that needs to be monitored especially for the process of refactoring. Due to the nature of the larger possible options for refactoring, search based software engineering practices provide a best possible way in improving the code...
Nowadays, password-based authentication is one of the most widely used methods to authenticate a user before granting accesses to secured websites. Password reuses within the same website and across multiple ones can enable shadow attacks. In this project, we study web password reuses by analysing a large number of sample data and combine dynamic authentication factor to achieve better efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.