The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Critical services in the field of Network Function Virtualization require elaborate reliability and high availability mechanisms to meet the high service quality requirements. Traditional monitoring systems detect overload situations and outages in order to automatically scale out services or mask faults. However, faults are often preceded by anomalies and subtle misbehaviors of the services, which...
Most, if not all, mining sites in the Philippines are not equipped with expensive or modern monitoring tools to check for quality of soil, water and air elements which are relevant to ensure safety and wellness of miners. This study focused on the development of low cost mobile electronic sensors to monitor quality of water from rivers near mining sites. Low cost electronic sensors connected to a...
In this paper, a new classification method for production water is proposed, based on so real-time measured parameters. The classification method consists of three steps: 1) An initial classification of the Water Quality Index is computed using the method proposed by KUMAR; 2) Feature selection based on random forest (specifically based on the method varSelRF); and 3) Training of classifiers using...
In this paper, we present our analysis using four different systems on two different one-way network traffic data sets. Specifically, we have explored the usage of two network traffic analyzers, namely Corsaro and Cisco ASA 5515-X, and two machine learning based systems, namely the C4.5 Decision Tree classifier and the AdaBoost.M1 classifier. We have employed these four systems on two publicly available...
The selection of optimal attributes from the set of all possible attributes of a network traffic is the first step to detect network intrusions. However, in order to optimize the effectiveness of intrusion detection procedure and decrease its complexity, it is still a challenge to select an optimal attribute subset. In this context, the primary problem of attribute selection is the criterion to evaluate...
This paper proposes a system of using machine learning algorithms to extract communication session information, such as conference bridge number and participant code, from users' emails or appointments. Our system can then use the retrieved information to easily setup a communication session, for example, dialing conference bridge number and participant code, as well as popping up web conference links...
The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient compared against the high spreading rate of malware. Hence, automated behavior-based malware detection using machine learning techniques is considered a profound solution. The behavior of each malware on an emulated...
Total Order Broadcast (TOB) is a fundamental building block at the core of a number of strongly consistent, fault-tolerant replication schemes. While it is widely known that the performance of existing TOB algorithms varies greatly depending on the workload and deployment scenarios, the problem of how to forecast their performance in realistic settings is, at current date, still largely unexplored...
The paper suggests the methods for learning compact representation of the optimal decision policies in a Markov decision process (MDP) framework for sensor-network based human health monitoring systems. The learning of a small decision policy is key to deploying the model in small sensor nodes with limited memory. The decision process enables distributed sensor nodes to adapt their sampling rates...
Current pervasive environments should contain mechanisms, such as personalization, that adapt the environment to help the user meet their individual needs. However, manually creating, maintaining and utilizing a preference set is no easy task for a user, requiring continued time and effort. A more desirable approach is to implicitly build and maintain the preference set by using monitoring and learning...
In order to realization electronic parts product appearance quality detection control, one kind of processor based on the intelligent knowledge automatic extraction and system intelligence modeling was presented. In the processor, wavelet-fuzzy technique and neural network technique are combined. Uses the fuzzy wavelet extraction image feature, and wavelet function is used as fuzzy membership function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.