The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Models are the cornerstone of Model-Driven Engineering (MDE). Their size is constantly growing, becoming one of the main problems when it comes to manipulating them, via model-to-model transformations, model-to-text transformations or simply parsing them. In this paper we propose a way of distributing Ecore models representing them as JSON and URLs as identifiers, since HTTP is one of the most successful...
Now-a-days, providing a platform, where customers can obtain first-hand assessments of product information and manufacturers can collect customers reviews cum feedbacks to improve the product quality, is the prime need of any organization. These reviews are the people's opinion about particular product. Every website has reviews of their product and those reviews are difficult to analyze. Thus, the...
In this paper we present a new Smart Online Vehicle Tracking System for Security Applications (AMOTSSA) and we describe how it can be modelled and implemented as a Big data application. In order to model AMOTSSA as a big data application, we argue our design choices that meets its specific data and processing needs and we present a set of data analytic algorithms that would achieve a set of investigation...
This paper proposes an improved FP-Growth algorithm which modifies the support count to filter high confidence and high lift telecommunication network alarm big data. And to satisfy the big data environment, this paper improves the algorithm to be a distributed algorithm based on Spark. Experiments show that the improved FP-Growth algorithm mining strong association rules either in frequent patterns...
Gesticulation, together with the speech, is an important part of natural and affective human-human interaction. Analysis of gesticulation and speech is expected to help designing more natural human-computer interaction (HCI) systems. We build the JestKOD database, which consists of speech and motion capture recordings of dyadic interactions. In this paper we describe our annotation efforts and present...
Accessibility is an important aspect of websites generally and public websites particularly. Many ways could be proposed to enhance accessibility, however the impact of selected actions is hard to predict due to diversification and contradiction, in addition to the existence of the time factor. A System Dynamics simulation model including factors affecting the accessibility of Norwegian municipal...
The traditional pure software emulation mode and sandbox mode simulation systems can only analog computer interlock operation, lacking simulation of field devices, and cost a lot in installation and maintenance. To solve this problem, we introduce a new network computer interlocking simulation system, which is designed based on B/S mode, ASP.NET and Web 3D technology. Being put into practice, it proves...
Semantic information retrieval technique is widely applied in various research areas. However the key consideration is about selecting the most extensive external source which can be used for augmenting the query. In this research paper we have employed WordNet and Wiktionary as two external sources for expanding the query and finding the effect of it over the similarity models. We found that a combination...
In this paper, fast ellipse fitting based pupil tracking design is studied for human-computer interaction applications. The proposed scheme uses the two-stage Random Sample Consensus (RANSAC) based fast ellipse fittings. At the first stage, the binaried pupil contour based ellipse model is applied to select the possible candidate points on Canny filtered edges. At the second stage, the Canny edge...
If originally computers were used only as a tool to perform some calculations, nowadays computers has a lot of functions to help people finish their tasks in almost every aspect of human life. As a lot of various functions computers have, they also need different specifications for each computer so they can do their tasks according to their functionalities. Therefore this application was build with...
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
Computer Science has evolved towards a discipline with different branches. Software is designed, produced and linked taking into account different viewpoints. This process typically involves multidisciplinary teams: Front End Developers, (OO)Programmers, Database Engineers. Software developers, who were educated in different computing disciplines, meet on the shop floor, where they link together software...
RFID is one of wireless technology that can be used in various sectors of human life like military, school, sport, health, industry, security, animal, and other areas. RFID mainly consist of two important parts, the reader (combination of transceiver and antenna) and the tag (consist of unique number). The use of unique number inside the tag is very useful as an identity of an object or as tracking...
With large companies and corporations becoming increasingly responsible for data collection, in recent years, a growing number of scientists have proposed using a variety of algorithms and different theories to solve the database problem. Even though existing solutions are effective in many cases many, problems are left to solve during the integration of database. The entity resolution (ER) is a crucial...
With the rapid growth in mobile and wireless computing technology, location management techniques become a paramount issue to enable the terminals to continuously receive services when moving from one location to another. Future Personal Communication Systems (PCS) will support a huge user's population and a network spanning over a large geographical area. In such systems, the signalling traffic and...
The widespread use of mass spectrometry for protein identification has created an urgent demand for improving computational efficiency of matching mass spectrometry data to protein databases. With the rapid development of chip technology and parallel computing technique, such as multi-core processor, many-core coprocessor and cluster of multi-node, the speed and performance of the major mass spectral...
Web based computing technology and services has proliferated exponentially and seen mammoth growth in the way people interact with systems across the globe since last decade. Nowadays user community has turned into contributor community and interactive social web platforms have made them empowered for global content creation and consumption. This content exploding is continued and ever increasing...
Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.