The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Diabetes management is a complex and a sensible problem as each diabetic is a unique case with particular needs. The optimal solution would be a constant monitoring of the diabetic's values and automatically acting accordingly. We propose an approach that guides the user and analyses the data gathered to give individual advice. By using data mining algorithms and methods, we uncover hidden behaviour...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
Any adaptive traffic control system applied for an entire network must be flexible, in order to adjust the signalling times for each junction according with real traffic data, according to a macroscopic vision. Also, it must be network synchronized, in order for each signalling time modification to be correlated with the other junctions in the network. The system must also be able to properly respond...
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
A versatile framework for automation of sophisticated farm machinery has been proposed in this paper. The paper details the functional design and development of the hardware and software architecture of the framework for electronic monitoring and control of a complex system. The framework aims to provide a user friendly bridge between the digital world and the physical world and covers the core software...
Concentration of Carbon monoxide (CO) and Carbon dioxide (CO2) that high in the air is very dangerous for human life. Carbon monoxide is a poisonous gas that damages the circulation of oxygen in the blood when inhaled, while carbon dioxide is one of the gases that cause global warming. Both gases are classified as colorless and odorless gas so that the necessary special tools to monitor their concentration...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
This paper simply introduces the meaning and equipment of radio monitoring, and mainly discusses how to design a platform which can storage, manage, retrieve and analysis radio coverage data based on B/S model by using database and Baidu map JavaScript API technology and combining with the characteristics of radio monitoring equipment. Radio coverage data from radio monitoring equipment will go into...
This work aims to realize identity recognition using images from one Database [1]. This facial database is composed of 3D dynamical images or 4D considering the time component as the fourth dimension, where the head movements are removed and only the facial dynamism is considered. The identity recognition is done by an Artificial Intelligence method based on Artificial Immune System of Negative Selection...
Database audit logs contain the information about database operations which are helpful to verify accuracy, lawfulness and to report risks. In financial systems, the audit logs should be monitored on continuous basis in order to detect and take action against any reasonably abnormal behavior. Outlier detection is a very important concept in the data mining which is useful in data analysis. Nowadays,...
When attackers try to gain access to cloud infrastructure, platform, or service, cloud forensics must be performed to find out that who is behind the attack. To perform forensics in cloud environment, we need to identify and to analyze potential evidences, network traffic, registry, web browser history. Log acquisition is the process to collect log from available sources such as operating system logs,...
Today few organizations have a thorough understanding of what is on their networks at any given time. This study tries to develop Computer and Network Asset Manager (CNAM) that is a network management application which helps large enterprises, and Small medium enterprises (SMEs) service providers, manage their data centers and IT infrastructure efficiently and cost effectively. CANM collects information...
The Information technology (IT) plays a key role in the functioning of the modern era. The evolution of computer is very fast. It improves the efficiency of processing, the capacity of memory and the transmission rate of network. The procurement department will procure the new resources. They did not know that equipment suit any budget because they may not track changes or the development of a computer...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems or network resources by both system insiders and external penetrators. The proliferation of heterogeneous computer networks provides additional implications for the intrusion detection problem. The increased connectivity of computer systems gives greater access to outsiders, and makes it easier...
The use of Wireless Sensor Network (WSN) has been widely used in many fields, especially for environmental monitoring. This present study attempts to apply the WSN technology into the retail industry or the modern market. Utilizing barcode scanning technology as a medium of sensors that are commonly used, combined with a microcontroller and XBee modules as data transmission module. This study adds...
In this paper we present our approach in the field of Intelligent Tutoring System (ITS), in fact the risk of dropping out for learners have emerged as crucial issues to be solved. So it is necessary to ensure an individualized and continuous learner's follow-up during learning process. Several research effort has been spent on the development of ITS. However the available literature does not generally...
The Trigger and Data Acquisition (TDAQ) and detector systems of the ATLAS experiment deploy more than 3000 computers, running more than 15000 concurrent processes, to perform the selection, recording and monitoring of the proton collisions data in ATLAS. Most of these processes produce and share operational monitoring data used for inter-process communication and analysis of the systems. Few of these...
In order to access a high level processing, scalability and reliability, one needs to process machine level data in high level data processing and makes a connection between them (make them coherent). This paper is intended to monitor Delta PLC 14SS in .NET frame work, c#, by monitoring a glazier machine, it is aimed to describe how to address and to access inputs, outputs and memories of PLC which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.