The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents development of a thin film aluminum microheater and a nickel temperature sensor for low temperature applications by using Micro-Electro-Mechanical Systems. Both of them are fabricated onto a glass substrate and protected by thin PDMS membrane. The microheater is energized to find sensor characteristic. As linearity and accuracy of nickel sensor give a wide temperature range, its...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Classification of the numerical data is a very important research topic in machine learning. But the incomplete data is very common in real world application. And the existence of incomplete data degrades the learning quality of classification models. But the existence of incomplete data always decrease the quality of classification models, To show the definition of missing data more intuitively,...
Style-based text authorship identification extracts features from authorship-known texts, constructs classifier and then identifies disputed texts. Authorship identification belongs to the domain of style classification and is a branch of text classification. In contrast with text classification which deals with the content of texts, authorship identification focuses on the form property of texts...
Signature-based anti-viruses are very accurate, but are limited in detecting new malicious code. Dozens of new malicious codes are created every day, and the rate is expected to increase in coming years. To extend the generalization to detect unknown malicious code, heuristic methods are used; however, these are not successful enough. Recently, classification algorithms were used successfully for...
This study centers on multiple-scheme encryption using annotation technology. The objective was to propose a composite encryption framework that combines several encryption specifications. It was assumed that combining several encryption standards can further enhance information security. It divided a message to be encrypted into packets and each packet was coded with a methodology independent of...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
Port state control (PSC) inspection is the most important mechanism to ensure world marine safe. Recently, some SVM-based risk assessment systems have been presented in the world. They estimate the risk of each candidate ship based on its generic factors and history inspection factors to select high-risk one before conducting on-board PSC inspection. However, how to improve the performance of the...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
The field of electronic noses and gas sensing has been developing rapidly since the introduction of the silicon based sensors. There are numerous systems that can detect and indicate the level of a specific gas. We introduce here a system that is low power, small and cheap enough to be used in mobile robotic platforms while still being accurate and reliable enough for confident use. The design is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.