The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious software poses a great risk to critical infrastructure. Researchers have proposed numerous ways to analyze malware behavior in order to understand and respond to this threat. However, only little attention has been paid to the organization of the malware analysis process itself. In this paper we present the Malware Analysis and Storage System (MASS), a novel framework for malware analysis...
The problems of reconfiguration of CAD system architecture are analyzed. The concepts of adaptive architecture of Computer-Aided Design system are represented. System of basic operating units of the CAD process is offered.
This article aims to describe, in brief, the formation process of the Pedagogical Standard for the Analysis of Virtual Learning Environments. This Standard is a tool that is intended to aid subjects in the process of choosing a particular Virtual Learning Environment through an analysis including the pedagogical aspects of these environments. The qualitative approach was adopted in the methodological...
There are various types of applications for fingerprint recognition which is used for different purposes. Fingerprint is one of the challenging pattern Recognition problem. The Fingerprint Recognition system is divided into four stages. First is Acquisition stage to capture the fingerprint image, The second is Pre-processing stage to enhancement, binarization, thinning fingerprint image. The Third...
This paper analyzes applying of process management in government project “e-license”. Analyzing of process management implementation and creation of e-government projects on this basis is an actual task. Process management is now the most effective IT tool used to implement the process approach to government agencies, allowing not only to manage the processes online, but also to establish continuous...
This paper simply introduces the meaning and equipment of radio monitoring, and mainly discusses how to design a platform which can storage, manage, retrieve and analysis radio coverage data based on B/S model by using database and Baidu map JavaScript API technology and combining with the characteristics of radio monitoring equipment. Radio coverage data from radio monitoring equipment will go into...
The purpose of Text Mining is to process unstructured (textual) information, extracting meaningful numeric indices from the text, and, thus, make the information contained in the text accessible to the various data mining (statistical and machine learning) algorithms. Information can be extracted to derive summaries for the words contained in the documents or to compute summaries for the documents...
Army logistical systems and databases contain massive amounts of data that require effective methods of extracting actionable information and generating knowledge. Vehicle diagnostics and prognostics can be challenging to analyze from the Command and Control (C2) perspective, making management of the fleet difficult within existing systems. Databases do not contain root causes or the case-based analyses...
Computation offloading is a paramount technology to leverage network resources for mobile devices. This paper studies effect of computation offloading on efficiency of mobile face recognition. It compares offloading alternatives used in existing mobile face-recognition system and reports on their efficiency in terms of energy consumption, processing time and recognition accuracy. The offloading method...
Whatever our field (research, education, industry, etc), generally we follow the same process recruitment: launch calls for tender to find candidates: PHD students, PostDoc, engineers, etc Usually, human resources service which is in charge of the first selection: application corresponds to the tender. Generally, for a large number of CVs, we must find the best candidate. Everyone wants the best candidate!...
A survey of software and technology architecture about systems dedicated for analysis of Online Social Networks (OSN) will be presented. Based on the comparison and own experiments a novel approach proposed. The steps of experiments are described. The proposed solution is applied for Twitter and Facebook.
This study evaluated/analyzed parts after collecting/analyzing various data of the core parts like motor, inverter and high-voltage battery equipped in green cars, in real-time for each season and each driving road by using the real-time driving monitoring system. In case of green cars in which high-voltage battery is the main power source, the changes of parts characteristics caused by the external...
The Network Connectivity Analysis Model (NCAM) is a general purpose radio frequency (RF) event-based simulator that addresses the physical layer of the International Organization for Standards (IOS) Open System Interconnect (OSI) 7-layer model for wireless communication systems. With a modular design hierarchically organized to emulate an actual physical test setup, NCAM provides the U.S. Army with...
The high-volume, low-latency world of network traffic presents significant obstacles for complex analysis techniques. The unique challenge of adapting powerful but high-latency models to realtime network streams is the basis of our cyber security project. In this paper we discuss our use of NoSQL databases in a framework that enables the application of computationally expensive models against a real-time...
This paper presents a method of analysis and processing of digital images, with a particular interest in the technique that uses the set of Gabor mathematical functions (Gabor wavelet). It also proposes a method of image indexing and searching, according to the information contained in the image. This information is defined by a signature obtained using a Gabor filter. Medicine represents a possible...
The balance between privacy and security concerns is a hotly debated topic, especially as government (and private) entities are able to gather and analyze data from several disparate sources with ease. This ability to do large scale analytics of publicly accessible data leads to significant privacy concerns. In particular, for the government, there is the fear of a fishing expedition against individuals...
This paper is dealing with an analysis of implementation steps for KPIs, a proposal of several KPIs that can be well adopted by small enterprises and an analysis of problems we are facing during the development phase of KPIs generation tool.
In this paper, we design and implement a reliable data processing and analysis test bed (NESCTB) for wireless sensor networks (WSNs). It contains 36 wireless sensor nodes connected through Ethernet to a central server so that, with web interface, remote users are able to schedule tasks and monitor the nodes' operations online. In addition, reprogramming and data logging can also be provided via the...
This paper proposes a design about sewage-source Heat Pump - Remote Monitoring System based on Web access internet configuration software. The main purpose of this design is to achieve the remote monitoring device parameters, and provide data reference for a comprehensive evaluation of technical indicators of Sewage source heat pump system. The article analyzes the process flow of sewage source heat...
To analyze and extract design of existing games is an interesting game research area but they are subjective due to different personal opinions. This paper presents method for finding central among personal vision of analyses by using graph-based representation of game design which allows the common to be found by the use of graph mining technique. The experimental result shows common graph which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.