The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion detection and forensic analysis techniques depend upon monitors to collect information about possible attacks. Since monitoring can be expensive, however, monitors must be selectively deployed to maximize their overall utility. This paper introduces a methodology both to evaluate monitor deployments quantitatively in terms of security goals and to deploy monitors optimally based on cost...
Non-lossy compression can save time and energy during communication if the cost to compress and send input is less than the cost of sending it uncompressed. Unfortunately, compression can also degrade performance, no single method is always beneficial, and outcomes depend on many factors. As a result, compression choices in real systems are coarsely grained and manually controlled, resulting in suboptimal...
Learning difficulties amongst postgraduate students have been cited as one of the most neglected problems. Eye tracking plays an important role in gathering data about how students interact with the learning material. This paper proposes a new approach of using high speed eye tracking equipment and fast computer monitors to collect the necessary gaze contingent eye fixation data of the Japanese English...
The applications that are data intensive and large-scale is run by data centers based on Map Reduce implementation. Map Reduce runs on large clusters which needs vast amounts of energy which parallel increase cost of the data centers, Energy reduction has to be incorporated into the map reduce implementation to improve the efficiency of the data center. In order to achieve the good performance, model...
Cloud computing is recently has emerged as a pattern for hosting and service delivery on internet and has rapidly become a hot topic in academic and commercial environments and has attracted many people. Nowadays, we are encountering various cloud service providers. One of important aspects in cloud computing is service level agreement which is a contract involving service agreement between client...
With development of Multicore clusters the taskscheduling problem in heterogeneous cluster has become hot point of research. The method to solve this problem in Cloud computing is virtualization, which can make the heterogeneous nodes being isomorphic and then using MapReduce model for task scheduling in isomorphic nodes. But the approach has some shortcomings: virtualization itself will cause the...
Learner's knowledge assessment is very important in the e-learning system. Knowledge assessment is effective for knowledge gap discovery. Knowledge gap, Causes the learners do not understand educational content correctly. This paper presents a new method for learner's knowledge modeling based on knowledge gap discovery for concepts of educational content. There are two methods for learner's knowledge...
The betweenness centrality of a node is a measure related to the number of shortest path the node is involved with. It is, indeed, a measure of the importance of the node in the network, and in the recent years has been used intensively for network analysis. The major drawback of this measure is its high computational cost, and thus in the literature several works appeared providing ways of approximating...
Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading...
Based on operator SPJ (Select-Project-Join) and the technology of self-maintainable view, this paper proposes a new maintainable model of materialized view; the proposed model contains two processes: the monitoring process and maintenance process, the first process is used to monitor the changes of basic tables; while the second process will automatically update the materialized view by auxiliary...
The assessment of the sustainability and vulnerability of a particular geographical region could be performed by simulating different scenarios based on environmental changes and water quality models. The gSWAT application allows the calibration of the SWAT models and the execution of different scenarios based on calibrated SWAT model over the Grid infrastructure. The requirements for running the...
Current provenance collection systems typically gather metadata on remote hosts and submit it to a central server. In contrast, several data-intensive scientific applications require a decentralized architecture in which each host maintains an authoritative local repository of the provenance metadata gathered on that host. The latter approach allows the system to handle the large amounts of metadata...
In large-scale compute cloud systems, component failures become norms instead of exceptions. Failure occurrence as well as its impact on system performance and operation costs are becoming an increasingly important concern to system designers and administrators. When a system fails to function properly, health-related data are valuable for troubleshooting. However, it is challenging to effectively...
Most of transformer substations had installed all kinds of online monitoring systems of electric equipment, these systems were usually independency and redundancy, so they can not share computer resources each other, and it is not in favor of examining insulation states. A Support System for High Voltage Electric Equipment Condition-based Maintenance of Transformer Substation based on whole transformer...
In this paper we present the results of an experiment, which combined the Impactorium tool with the RAHS System. We describe the intelligence analysis process supported by the tools and give a brief introduction to the tools. Results from a Swedish study that influenced the version of Impactorium tested in Singapore are reported. We conclude with some suggestions for future studies of Bayesian belief...
Conficker is a worm outbreak recently which form a large botnet and became a huge threat to the security of the internet. In this paper, the redirect technology of domain name was used to monitor the conficker. For it's low killing rate and long-term period of propagation, we built a propagation model of botnet based on conficker monitoring. In the model, we take into account the geography, connectivity...
In this paper, the author proposes a 3DVR (three-dimension virtual reality) technology that based on multi-sensor fusion to realize the shearer remote monitoring. In order to real reappear the working field underground this system collects the sensor data of the underground equipments, analyzes and processes data with multi-sensor fusion technology, drive the 3d (three-dimension) models in the control...
Deploying radiation portal monitors (RPMs) at U.S. ports of entry requires an understanding of an RPM system's performance at sites with a large number of RPMs. This paper describes an RPM Multi-Lane Simulator that has been designed and implemented to simulate vehicle traffic at these sites. The Simulator's flexible architecture simulates vehicle traffic with its associated radiation profiles and...
Exploring the trivial workflow data needs high performance data processing technology. In this paper we put forward analysis method of workflow execution data based on data mining. The main idea of it is to retrieve the workflow data to a data warehouse and adopt OLAP technology and data mining method to support customers to select different measures and view the corresponding data in different dimensions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.