The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile eLearning are capable to avail children in improving learning capabilities, self-consciousness living, and profession growth. They can inspire the perfection of eLearning with the diverse subservient smart handled devices. Most available software applications that are attainable by children are done without taking in consideration their needs and specific deficiency. We have investigated Arabic...
Application-based access control technologies are used to protect systems from malicious or compromised software. Existing rule-based access control systems rely on a comprehensive policy, which defines the resources an application is allowed to access. The generation of these policies is a hard and error-prone task for system engineers. In this work, we provide a framework to automate this task and...
Tool-based code review is growing in popularity and has become a standard part of the development process at Mi-crosoft. Adoption of these tools makes it possible to mine data from code reviews and provide access to it. In this paper, we pre-sent an experience report for CodeFlow Analytics, a system that collects code review data, generates metrics from this data, and provides a number of ways for...
Internet of Things (IoT) is extension of current internet to provide communication, connection, and inter-networking between various devices or physical objects also known as “Things.” In this paper we have reported an effective use of IoT for Environmental Condition Monitoring and Controlling in Homes. We also provide fault detection and correction in any devices connected to this system automatically...
Real-time context monitoring in public indoor space is a key technology for cyber-physical systems. Recent research studies have shown that analysis of geo-tagged multimedia data on social networking websites enables accurate detection and localization of “events” in real world, which attract attention of a number of people (e.g., earthquakes). Although the similar idea could also be applied to local...
World Wide Web is an enormous store of links and web pages. It provides huge amount of information for the Internet clients. The development of web is great as about one million pages are added every day. Users' accesses are traced in web logs. Because of the great usage of web, the web log files are increasing at a more rapidly rate and the range is becoming enormous. Web Usage Mining relates mining...
VANET is a wireless network that provides driving comfort and road safety. VANET cannot guarantee correct detection of dangerous road conditions, and communication between vehicles when the network is very high, which is dangerous to drive safely. We propose a new scenario using VANET for rescue purpose at time of emergency to overcome such dangerous accidents and communication problems in VANET,...
MapReduce has been applied to data-intensive applications in different domains because of its simplicity, scalability and fault-tolerance. However, its uses in biomedical association mining are still very limited. In this paper, we investigate using MapReduce to efficiently mine the associations between biomedical terms extracted from a set of biomedical articles. First, biomedical terms were obtained...
Modern scientific experiments generate vast volumes of data which are hard to keep track of. Consequently, scientists find it difficult to reuse and share these data sets. We address this problem by developing a schema-independent data cataloging framework for efficient management of scientific data. The proposed solution consists of an agent which automatically identifies new data products and extract...
Big Data technologies like hadoop are transforming analytics and processing, but is there a role mainframe can play in improving big data analytics deployed in organizations' private clouds? Over the period of 60 years, mainframe has contributed extensively to the IT industry but has been replaced by newer machines and methods these days. In this paper we will examine some potential advantages mainframe...
In our current society, the threat of cyber intrusion is increasingly high and harmful. With the rise of usage in computers, criminal activity has also shifted from physical intrusion into cyber intrusion. Intrusion detection systems provide the ability to identify security breaches in a system. A security breach will be any action the owner of the system deems unauthorized. Current methods used for...
Big data is a collection of datasets which are so large and complex. Data sets are growing day by day and sharing, transfer, capture, storage, etc. are the main challenges in Big Data. Data mining discovers patterns from a large data set. Data mining with Big data is a complex task. HACE theorem is proposed which finds Complex and Evolving relationships among data. It finds the characteristics of...
The current Analytics tools and models that are available in the market are very costly, unable to handle Big Data and less secure. The traditional Analytics systems takes a long time to come up with results, so it is not beneficial to use for Real Time Analytics. So, the proposed work resolves all these problems by combining the Apache Open Source platform which solves the issues of Real Time Analytics...
The ongoing increase in the usage of web has led to accumulation of large amounts of data every second. This has in turn made the research industry to grow and focus towards employing web usage mining for increasing the revenues for businesses, carrying out analysis on browsing behavior of web users, improving website layout and much more. Web usage mining is becoming increasingly popular due to the...
While horizontal partitioning of traditional relational databases is well studied, there is in comparison very little in the literature about the partitioning of NoSQL databases, especially those that are cloud based, such as Amazon's SimpleDB. In order to optimize the response time of a web application using a cloud based database, it is possible to partition the database for storage on local regional...
This paper examines the detection properties of obfuscated network buffer overflow attacks by selected IDS and NBA. The obfuscation was performed by tunneling the malicious traffic in HTTP and HTTPS protocols with the intention of simulating the usual legitimate characteristics of the HTTP traffic's flow. The buffer overflow vulnerabilities of four services were used: Samba, BadBlue, Apache, DCOM...
A data space system manages a variety of heterogeneous data in integrated and incremental fashion. In order to populate the data uniformly requires a data publication tool which will able to extract the data from the data sources, and translate them into a regular format. In this paper, we have proposed a flexible architecture of Data space Publishing Tool (DSP Tool) for publishing the heterogeneous...
Minimising the impact of distributed transactions (DTs) in a shared-nothing distributed database is extremely challenging for transactional workloads. With dynamic workload nature and rapid growth in data volume the underlying database requires incremental repartitioning to maintain acceptable level of DTs and data load balance with minimum physical data migrations. In a workload-aware repartitioning...
Industries keep a check on all statistics of their business and process this data using various data mining techniques to measure profit trends, revenue, growing markets and interesting opportunities to invest. These statistical records keep on increasing and increase very fast. Unfortunately, as the data grows it becomes a tedious task to process such a large data set and extract meaningful information...
Healthcare system can be enhanced vastly with the use of modern information technology. Still now in underdeveloped and developing countries, traditional paper based system is being used in healthcare. Although very few organizations use computer based system, they could not establish a ubiquitous network among patients, physicians and government. Cloud computing is the emerging technology which can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.