The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Studying complex systems including biological systems is a multi-disciplinary research area. It must be derived by the recent explosion of ICT including high-performance computing, high-throughput experiments, the Internet, knowledge discovery and Artificial Intelligence (AI). The goal of this research is to establish a computational architecture and tools to deal with complex systems based on such...
Condition-based maintenance is nowadays considered as a key-process in maintenance strategies and prognostics appears to be a very promising activity as it should permit to not engage inopportune spending. Various approaches have been developed and data-driven methods are increasingly applied. The training step of these methods generally requires huge datasets since a lot of methods rely on probability...
E-learning has become a major trend in the computer assisted teaching with the rapid development of Internet technologies. Web-based education is a very important component of education technology. One of the main advantage is the classroom and platform independence. Implementing Artificial Intelligence (AI) techniques to support efforts to improve the Web's intelligence and provide better services...
The problems related to security for network systems are relative to the design of network architectures, which is typically based on open standards. Monitoring tools based on pattern recognition or behavioral analysis is typically used to ensure network security. SNORT is one such tool which is based on pattern recognition. SNORT alerts system administrators whenever it receives packets of information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.