The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social media comprise the set of tools that "enable people to connect, communicate, and collaborate," and these tools include blogs, wikis and social network sites. This paper reviews the significance of these tools and explores how together they can result in instances of virality (e.g., viral videos). Using new insights on viral processes, we provide a critical review of epistemological...
The internet is becoming more popular, and e-learning is in the same situation too, in this paper, the Mastery and Flow theory will be discussed. In the e-learning many people are involved in the digital content study?learning and etc., in the past few years, if learner want to catch a new knowledge or technology, he/she will spend a lot of time and fortune, but after internet and web skill become...
In order to solve emotional absence of visceral layer, behavioral layer and reflective layer of web-based curriculum, emotionalized design theory is applied to build the frame of it. By designing from three aspects, which are inner feeling of the interface design, behavioral experience of the interactive design and reflective record of thoughtful reaction, emotionalized frame embedded into network...
This three-phased study examines corporate blog use, specifically the impact and value of blogs on organizational social capital and knowledge sharing at Dell Inc., a global computer manufacturer. The impact of social-mediated Web 2.0 technologies on organizational social capital has received limited attention in scholarship, possibly because of the inevident connection to measurable economic value...
Inspired by the ideas of the ldquoglobal brainrdquo and Swarm Intelligence, a concept of ldquocommunity intelligencerdquo is suggested in the present paper, reflecting that some ldquointelligentrdquo features may emerge in a Web-mediated community from interactions and knowledge-transmissions between community members. A conceptual model of community intelligence is developed from two views. From...
Along with the rapid development of electronic commerce and the increasing Internet users, the market of electronic auction has expanded. However, online auction centers remain to be an insecure environment and the bidderspsila identities and private information may still be under threat by malicious hackers. To consider account security, among the main rules of online electronic auction is that the...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Many governments have delivered their services in ways that meet the desires of the citizens and businesses they serve, enabling them to interact securely in places and at times that are convenient for them. E-government is one of the most important achievements of the Internet. Successfully implementing e-government requires a level of trust on the part of all transaction parties. There are several...
The well-know binary method is a generally acceptable method for modular exponentiation in public-key cryptosystems. In this paper, we propose a new binary exponentiation algorithm, which is based on common-multiplicand method, Montgomery modular reduction algorithm, signed-digit recoding technique, and binary exponentiation algorithm. The common-multiplicand technique is developed to solve the problem...
Ensuring public security is an important issue for every government, and effective public security depends on the efficiency of criminal justice processes and procedures. The procedures of the criminal justice may be viewed as the upper-, middle-, and down-stream sections of a supply chain. Like their business counterparts, most law enforcement agencies have to deal with logistics, information flow,...
This paper modifies an elegant data hiding method of Chang et alpsilas [Pattern Recog. Lett. 2004, vol. 25, no. 11, 1253-1261]. The embedding employs a modified search-order coding (SOC) technique to hide binary secret data in the vector quantization (VQ) index file of a host image. The recovered host image is identical to the one recovered by traditional VQ; the compression rate is competitive to...
Classification of the numerical data is a very important research topic in machine learning. But the incomplete data is very common in real world application. And the existence of incomplete data degrades the learning quality of classification models. But the existence of incomplete data always decrease the quality of classification models, To show the definition of missing data more intuitively,...
Style-based text authorship identification extracts features from authorship-known texts, constructs classifier and then identifies disputed texts. Authorship identification belongs to the domain of style classification and is a branch of text classification. In contrast with text classification which deals with the content of texts, authorship identification focuses on the form property of texts...
Intelligent surveillance systems have become an important research issue recently. They can provide an early warning or help us to retrieve interested video frames. The motion detection techniques play an important role in these two applications. In this paper, we propose an effective surveillance video retrieval method based upon the motion detection technology. We can use this method to search frames...
Signature-based anti-viruses are very accurate, but are limited in detecting new malicious code. Dozens of new malicious codes are created every day, and the rate is expected to increase in coming years. To extend the generalization to detect unknown malicious code, heuristic methods are used; however, these are not successful enough. Recently, classification algorithms were used successfully for...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
It is necessary to analyze the anti-terrorism performance of Taiwanpsilas security system after September 11, 2001 attacks. We use three stage data envelopment analysis model that Fried et al. (2002) developed, getting intelligence performance of the Investigation Bureau of the Ministry of Justice, to discuss the ability of anti-terrorism in Taiwanpsilas national security system. Putting 10 outputs,...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Sem@ntica is a system for extracting the information contained in collections of documents into a knowledge base. It combines high quality conventional named entity analysis with an ontology class labeling capability for open class words. The ontology comprises an upper ontology and one or more domain ontologies. The system has tools for rapidly designing the ontology and mapping segments of Word...
Linear motion and out-of-focus blur often coexist in a surveillance system, which degrade the quality of acquired images and thus complicate the task of object recognition and event detection. In this work, we present a point spread function-based (PSF-based) approach considering fundamental characteristics of linear motion and out-of-focus blur based on geometric optics to restore coexisting motion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.