The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is to discuss on the effective use of simulation technology in the leadership teaching and learning at Institute of Higher Learning (IHL). This methodology is used to improve the leadership ability of the graduates at National Defence University of Malaysia (NDUM). It also enables the assessment of students' generic skills in the areas of practicals, communications, teamwork, work ethics,...
This paper investigates the prospects and compares the potential pathways of the open government, transparency, collaboration, and citizen participation initiatives in the US and in Mexico. The study aims at increasing the understanding to what extent and under which circumstances these initiatives might successfully establish or re-establish the balance of powers among the branches of government...
This paper describes the innovation & creativity with LEAN approach for PPV TIU performance improvement. PPV is CPU's platform validation product screening to confirm product functionality in actual customer computer systems running MS Windows, Linux or other operating systems and software, Test Interface Unit (TIU) is type of custom interface for product testing based on customer requirement...
After a brief analysis to the information spreading mode under internet-based micro-blog platform, it quickly classifies and audits the related mirco-blog content in the spreading process in this paper. Then, by analyzing the sender's mood tendency to some specific topics in the content of micro-blog message, it proposes a content audit model under the micro-blog service platform. Furthermore, by...
Current approaches to the query of wireless sensor networks address specific sources such as individual sensors or transducers. We believe that it is important to have a higher level mechanism of abstraction for querying a sensor network. In this work we aim at querying complex events, where such an event is modeled as a condition computed over a complex aggregate of sensed data. When the condition...
In 2004 the Knowledge-based Intelligent Engineering Systems (KES) Centre and the Aviation Education, Research and Operations (AERO) Laboratory formally agreed to collaborate on a number of aviation safety related projects. This collaboration has been important, and highly advantageous, in the identification of aviation safety related problems and their potential AI/CI based solutions. The collaboration...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
Using the Yinchuan new generation radar volume scan data of severe convective precipitation in 2004-2005, composite reflectivity images in polar coordinate were projected into the coordinate of x-y. 51 cases were studied with gray level co-occurrence matrix and the parameters of angle second moment, contrast, correlation, entropy and inverse difference moment. Results show that, there are obvious...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.