The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Representation of time series and similarity measure are the basis of time series data mining, but the common method of similarity measure isnt considering the morphology features, or isnt considering it at all, or is considering one of morphology and statistical feature. Aiming at this problem, proposing the composite representation of Symbolic Aggregate approximation (SAX) and bending value of angular...
In this paper, we propose a high capacity text steganography method using Huffman compression. The forward email platform is used to hide the secret data. We make use of the number of characters used in email id to indicate the hidden secret data bits. So, to make optimal utilization of number of characters in email ids, the characters added to the email id to indicate the secret data bits are taken...
Thermal convection and fluid flow in porous media has gained increasing research interest in recent years due to the presence of porous media in many engineering applications. Rough set theory has been regarded as a powerful feasible and effective methodology in the performance of data mining and knowledge discovery activities. This paper introduce a method for building knowledge for the rate of heat...
Outlier detection is an important issue in the realm of data mining. Several applications relay on outlier detection such as intrusion detection, fraud detection, medical and public health data, image processing, etc. Clustering-based outlier detection algorithms are considered as the most important outlier detection approaches. They provide high detection rate, however, they suffer from high false...
Nowadays, web has become widespread in terms of availability of contents related to every field. Also a large repository of web contents is turned up as a most challenging tool for searching and retrieving information. For scientists and researchers, resource or content searching has been very important. Todays, market is full of variant search tools over web having discrepancy in terms of working...
In this paper, a new technique is presented for mining key domain areas from scientific publications. A domain refers to a particular branch of scientific knowledge and hence largely defines the theme of any scientific research paper. The proposed technique stems from a fusion of knowledge derived from natural language processing and machine learning. Some words or phrases are extracted based on their...
The paper presents an analysis of directions of development of cognitive information technologies for mathematical education. Two aspects of the problem are highlighted, they are a simulation of mental processes of a student and a modeling of a subject area. The proposed concept of development of cognitive informational technologies is confirmed by a retrospective analysis of information technologies...
Understanding the impacts and patterns of network events such as link flaps or hardware errors is crucial for diagnosing network anomalies. In large production networks, analyzing the log messages that record network events has become a challenging task due to the following two reasons. First, the log messages are composed of unstructured text messages generated by vendor-specific rules. Second, network...
In this paper, we propose a method for representing “neighborhoods” of moving objects such as people. By using neighborhoods, it is possible to determine whether the spatial relations between objects and their surrounding spatial information are strong. It can be said that a neighborhood is the spatial area of an object's attention, interest or concern. It is preferable that neighborhoods move while...
File carving is a digital forensic technique. It aims to reconstitute a file from unstructured data sources with no knowledge of the file system. This paper presents an automatically carving method for RAR files. Since RAR is one of the most popular archive formats, and it is widely used on the digital devices to package data for transport or storage. It is important for forensic investigation to...
It is very important in many fields to mining the unusual data over the data streams. I propose algorithm MUD which are able to quickly and accurately find unusual data from the data streams. Recent works on sample method are not suitable for find the unusual data element from the data streams. In this paper, sample algorithm based on dissimilarity matrix is proposed. The extracted data element from...
The performance of non-preemptive M/M/l queuing system with two priority is newly proposed. Though this kind of queuing system is researched by many scholars, the performance indexes are often approximate. The complementary variable method is also used to make vector Markov process and analyze the state-change equations of the queuing system. With Rouche theorem to analyze the coefficient of the generating...
Based on probability, the paper recommends a new inference method for validating the trusted forensics. Using graph theory, the original data is formalized to abstract data, and is shown as some nodes in the graph. The operation actions and the forensics methods are abstracted to the edge sets. With these, and using probability theory, the probability of each node is calculated as its credence. With...
Spatial data balancing distribution can evidently improve the performance of parallel spatial database in shared nothing parallel architecture. Considering spatial locality and unstructured variable length characteristics of spatial data, this paper proposes a dynamic spatial data balancing distribution method under shared nothing parallel database environment. By using Hilbert ordering code to keep...
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those...
A new method for the parameterization of quadric surfaces is presented. To parameterize a general quadric implicit surface, the new method first translates the implicit surface to make it pass through the origin point, and then the parametric surface is obtained by substituting the coefficients of the implicit equation into the parameterization formula. As to the parameterization of a quadric implicit...
ElGamal digital signature scheme was analyzed. To overcome the shortage of ElGamal signature without message recovery, it was improved. Moreover, a kind of digital signature scheme with the function of message recovery was proposed. The security of the new scheme is based on the difficult solution of discrete logarithm on limited domain, which is as same as that of ElGamal signature scheme. Then,...
In this paper, a solution is proposed for n-Queen problem based on ACO (ant colony optimization). The n-Queen problem become intractable for large values of `n' and thus placed in NP (non-deterministic polynomial) class problem. The n-Queen problem is basically a generalized form of 8-Queen problem. In 8-Queen problem, the goal is to place 8 queens such that no queen can kill the other using standard...
Strict Integrity Policy (SIP) of Biba model can maintain the integrity of data in computer systems, but it might deny some non-malicious access requests of subjects and hence decreases the compatibility of applications. An improved SIP with dynamic characteristics is presented, which can increase the compatibility of the software while keeping the integrity as well as SIP can. And the proof is also...
As important access control policy on confidentiality, original BLP model was investigated in this paper. Its characteristic in lattice and shortcoming are analyzed. Then an extended BLP model with integrity is presented. The linear order trust level is used as integrity component with compound policy. The extension deals tranquility in BLP and dynamics in BIBA.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.