Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup'99 dataset. Then the newly created records (network...
Computers and Smartphone's becomes vital part of everyday life and hence use of internet becomes more and more. Due to internet, computers are becomes vulnerable of different kinds of security threats. Therefore it is required that we need to have efficient security method in order to avoid leakage of important data or misuse of data. This security method is called as Intrusion Detection System (IDS)...
As the smart devices revolutionize, people may generate a lot of data and store the data in the local or remote file system in their daily lives. Even though the novel computer hardware and network technologies can handle the demand of generating a big volume of data, effective file deduplication can save storage space in either the private computing environment or the public cloud system. In the...
This paper contains an analysis of the most widespread identification methods used in e-learning systems, revealing their benefits and drawbacks. Results obtained in our study of person identification based on the analysis of eye-tracking data are presented. A scheme of possible integration of identification method based on eye-tracking techniques into e-learning systems is described.
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors. We convert users' network activities information into different sequences...
The closed-form PO-PTD solution is presented to fast predict electromagnetic scattering from large-scale objects. The proposed closed-form formulation can avoid the intensive integral computation on surfaces and edges/wedges. Therefore, computation cost can be greatly reduced for electrically large structures. Numerical results show good accuracy and efficiency compared to those obtained from the...
In this paper, we propose a novel method for point clouds registration. In point clouds, there always exist a large number of surfaces with low curvatures. Let the surface locate in an OXYZ coordinate system, if we rotate the mean normal of the surface parallel with the Z axis, the 3D surface can be projected to 2D image via orthographic projection. Then we can detect and describe SIFT features in...
In this paper, we propose a hybrid method for intrusion detection which is based on k-means, naive-bayes and back propagation neural network (KBB). Initially we apply k-means which is partition-based, unsupervised cluster analysis method. In the form of clusters, we attain the gathered data which can be easily processed and learned by any machine learning algorithm. These outcomes are provided to...
Text Summarization is a method of reducing the original text document into a short description. This short version retains the meaning and information content of the original text document. It is a difficult task for human beings to generate the summary for very large documents manually. The linguistic and statistical features of sentence can be used to find the importance of sentences. The Latent...
In this paper, we focus on the need for a robust domain specific question answering system targeting agriculture domain. It aims to help farmers get information and resolve their queries related to agriculture and thereby improving agriculture literacy. The system is based on the principles of natural language processing and information retrieval. Most of the currently available information retrieval...
Attribute reduction approach is proposed in this paper based on a modified version of the flower pollination algorithm optimization (FPA). Flower pollination algorithm (FPA) is one of recently evolutionary computation technique, inspired by the pollination process of flowers. The modified FPA algorithm adaptively balance the exploration and exploitation to quickly find the optimal solution through...
Limited by the MEMS sensor's sampling rate, the non-commutable error that derived from finite rotation of rigid body should not be neglected. Aimed at high dynamic motion and high-speed rotation, this paper presents an optimized algorithm based on expert control system (ECS) which combined rotation vector algorithm and quaternion to solve attitude estimation. Compared with the traditional quaternion...
Beacon allows Bluetooth [1] devices to broadcast and receive tiny information within short distance, which consists of two parts: a broadcaster (beacon device) and a receiver (smartphone app). So, it is being widely used in URL (Uniform Resource Locator) broadcast, distance measurement, localization etc. However, because of its deviation, measured distance value is not always accuracy. In this paper,...
We proposed a scalable outlier detection method to identify outliers in large datasets with a goal to create unsupervised intrusion detection. In our work, the strength of Kolmogorov-Smirnov test and K-means clustering algorithm, both with linear time complexity, are combined to create fast outlier detection. While still maintaining high detection rate and low false alarm rate, our method can easily...
This paper proposes a real-time data compression and adapted protocol technique for wide-area measurement systems (WAMS). The compression algorithm combines exception compression (EC) with swing door trending (SDT) compression. The compression logic is designed to perform this algorithm in real time. Selection of compression parameters and data reconstruction are presented. An adapted protocol is...
This paper presents an average-value model of a line commutated converter-based HVDC system using dynamic phasors. The model represents the low-frequency dynamics of the converter and its ac and dc systems, and has lower computational requirements than a conventional electromagnetic transient (EMT) switching model. The developed dynamic-phasor model is verified against an EMT model of the CIGRE HVDC...
This paper proposes a novel control strategy for coordinated operation of networked Microgirds (MGs) in a distribution system. The distribution network operator (DNO) and each MG are considered as distinct entities with individual objectives to minimize the operation costs. It is assumed that both the dispatchable and nondispatchable distributed generators (DGs) exist in the networked MGs. In order...
People often need help when filling out paper forms, because they do not fully understand the meaning of form fields. Commonly adopted solutions are referring to the form filling instructions or consulting other people. However, they are either inefficient or inconvenient. In this paper, we propose a situation-aware and interactive system, named Interact Form, to help people fill out paper forms....
Motion Onset Visually Evoked Potentials (mVEPs) are elicited by visual stimuli that offer a more elegant, less fatiguing visual presentation than other stimuli used in visual evoked potentials (VEPs) studies. mVEP for use in brain computer interface (BCI) video gaming offer users a pleasant presentation environment to play video games. Modern, commercially available video games are a popular form...
In the proposed approach, an attempt was made to disambiguate Bengali ambiguous words using Naïve Bayes Classification algorithm. The whole task was divided into two modules. Each module executes a specific task. In the first module, the algorithm was applied on a regular text, collected from the Bengali text corpus developed in the TDIL project of the Govt. of India and the accuracy of disambiguation...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.