The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The sudden change in information technology has provided facility of trading in the Internet. There are several platforms available for trading but there is no suitable platform available for direct consumer-to-consumer trading mainly for students studying in a university so that they are able to purchase, sell their goods and make use of various services within the university. So this helps students...
Business analytics is an important means of gaining new insights and understanding of business performance. Data mining technology provides information needed by business analytics based on data. But due to the barriers of skill, resource and cost, business analytics is hard to carry out and put into practice for small and even medium sized enterprises. This paper presents a novel concept named Highly...
Botnets are a class of internet attacks having different characteristics as compared to the normal internet attacks. One of the features that uniquely characterize a botnet attack is that "the infected machine (Bot) is being remotely controlled by an entity called "Botmaster". The Botmaster remotely controls these infected systems through "Command and Control" servers (C&C)...
Reliably running large server infrastructures requires continuous monitoring of system states. Nowadays, these infrastructures are often being executed on an IaaS cloud infrastructure. At its heart IaaS cloud computing heavily relies on virtualization technology spanning from virtualized servers to networks. Compared to a typical server setup, virtualization introduces at least one additional layer...
Data Mining promises potential improvements in a variety of real-world problems. However large-scale implementations face an array of challenges between their inception and deployment, many of which are not technical in nature. This paper will describe the author's experience building one of the largest data mining systems in the world. The objective is to help orientate practitioners to the challenges...
Decision makers must know if their cyber assets are ready to execute critical missions and business processes. Net-work operators need to know who relies on a failed network asset (e.g. IP address, network service, application) and what critical operations are impacted. This requires a mapping between net-work assets and the critical operations that depend on them, cur-rently a manual and tedious...
The appearance of smart phones and their continuing rapid uptake has large affects on our society in as much as they represent a paradigm shift in the traditional industrial structure. The Telecom market is changing day by day, networks with the complicated and varied traffic have almost reached capacity because of the rapid increase of user and the service releases on smart phones. Therefore, the...
S4 is a general-purpose, distributed, scalable, partially fault-tolerant, pluggable platform that allows programmers to easily develop applications for processing continuous unbounded streams of data. Keyed data events are routed with affinity to Processing Elements (PEs), which consume the events and do one or both of the following: (1) emit one or more events which may be consumed by other PEs,...
This article discusses the development of monitoring system about the security situation in coal production and coal mining. In order to solve the problem of coal mine monitoring systems and self-management of coal enterprises, Adopt the Socket communication mechanism based on TCP protocol, design the Real-time monitoring and development of a WEB-based remote coal mine gas monitoring system. The test...
Monitoring telecommunications systems is of a crucial importance. Nowadays, PBX software packages can be configured to allow the storage of Call Detail Records in a database. There is a permanent need to analyze those records and allow business owners to detect PBX misuse from inside and outside the company. The word "misuse" covers an employee making too many personal phone calls, a salesman...
In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning consists a key part in this process and it consequently appears at the core of the Semantic Web architecture stack. From a practical point of view however, it is not always clear how applications may take advantage of the knowledge...
The requirements of OLAP applications increase rapidly by dramatically increased data volume, users, query volume and query complexity. The requirement for shortening update period in data warehouse is another crucial factor for a scalable OLAP application. In this paper, we propose a scalable OLAP prototype to support the query processing with increasing data volume by distributing the whole fact...
The category of systems that support the decision process is defined as the "business intelligence" term. On the whole, this regards all kinds of computer tools that add "Intelligence" to the business process. The traditional or operational application integration, along with a range of programs for data analysis or from the category of expert systems provides an effective basis...
This paper presents a simple, efficient and extendable solution for content extraction from web 2.0. Web 2.0 is perceived as the second generation of the web technologies. Web 2.0 has undoubtedly made significant impact in enriching the end-user experience and allowing programmers to write more interactive desktop-like applications for the web. However, it has also introduced some new issues for researchers...
This paper outlines the first Asian network-based speech-to-speech translation system developed by the Asian Speech Translation Advanced Research (A-STAR) consortium. The system was designed to translate common spoken utterances of travel conversations from a certain source language into multiple target languages in order to facilitate multiparty travel conversations between people speaking different...
Query by Singing/Humming (QBSH) is a most natural way for music recognition. A QBSH system can help find songs by matching a part of melody users sing or hum. Many Music Information Retrieval (MIR) techniques have been used to carry out the QBSH goal. In the past, little studies had ever been revealed about how to design and implement a simple QBSH system. In this article, we combine Short-Time-Fourier-Transform,...
A successful RFID system, not only shields the heterogeneity of the underlying equipment and deals with complex data ALE, but also dynamically configures the mapping relations between process nodes and RFID data in accordance with changes in business processes. This paper describes the RFID business process server, which uses the idea of process component model to configure the relations among ALE...
In this paper the operations under Symbian OS such as Socket Communication is researched and realized. Firstly the elementary knowledge about Sockets' system structure and core function class are detailed; secondly the Host resolution services and Internet Access Provider technology are deeply researched and realized; then the operation about Sockets Communication, under Symbian OS with procedure...
Botnets pose serious threats to the Internet. In spite of substantial efforts to address the issue, botnets are dramatically spreading. Bots in a botnet execute commands under the control of the botnet owner or controller. A first step in protecting against botnets is identification of their presence, and activities. In this paper, we propose a method of identifying the high-level commands executed...
Pedestrian navigation system has been widely used in many fields. In order to offer navigation information intelligible for pedestrian, we provide navigation sentences to users, which can be easily displayed on cellular phones with small display area. In addition, the navigation sentences can be converted into voice, which is useful for users in some special situations or with visually impairment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.