The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As Internet continues to influence our day to day activities like eCommerce, eGoverence, eEducation etc. the threat from hackers has also increased. Due to which many researcher thinking intrusion detection systems as fundamental line of defense. However, many commercially available intrusion detection systems are predominantly signature-based that are designed to detect known attacks. These systems...
GeoSocial Networks (GSNs) are becoming increasingly popular due to its power in providing high-performance and flexible service capabilities. More and more internet users have accepted this innovative service model. However, although GSNs have great business value for data analysis by integrated with location information, it may seriously compromise users' privacy in publishing the GSN data. In this...
A knowledge based system (KBS) has its advantage over conventional database systems in that it has the inference ability to deduce implicit knowledge from the explicitly stored information. KBS is however known to be labor intensive in its construction in the knowledge acquisition and elicitation phase. Researchers have tried to overcome this hindrance for more than four decades. Automatic creation...
The 3D face morphable model is applied in the hearing and speech rehabilitation for hearing-impaired children, put forward to 3D face morphable model is the core of special human-computer interaction model. Including 3D face, sound, vibration, air, video, gestures, etc., through the computer generate realistic 3D face expressions and motions, with corresponding voice vibration flow feedback information...
Computers are getting faster and faster; the operating systems are getting more sophisticated. Often, these improvements necessitate that we migrate existing software to the new platform. In an ideal world, the migrated software should run perfectly well on a new platform; however, in reality, when we try that, thousands of errors appear, errors that need correcting. As a result, software migration...
The SSD is adopted to improve the IO performanceof the storage system in the data center, the throughput allocation for clients is a challenging problem. We need to find a throughput allocation method, which can determine the throughput allocations of clients on each server, while both providing the fair allocations for clients and maximizing the utilization of system throughput resource in the entire...
The age of big data opens new opportunities in various fields. While the availability of a big dataset can be helpful in some scenarios, it introduces new challenges in digital forensics investigations. The existing tools and infrastructures cannot meet the expected response time when we investigate on a big dataset. Forensics investigators will face challenges while identifying necessary pieces of...
This paper proposes a novel distributed parallel EM modeling technique to speed up the process of neural network modeling for EM structures. Existing techniques for EM modeling usually need to repeatedly change the parameters of microwave devices and drive the EM simulator to obtain sufficient training and testing samples. As the complexity in EM modeling problem increases, traditional techniques...
Industrial control systems are an important part of critical infrastructures and their uninterrupted operation is important for many aspects of society. In recent years these systems have come under more scrutiny, as reports about attacks on them have become more frequent. There is therefore a need to better secure them, and the first step to achieve this is to identify the threat landscape for such...
Securing provenance has recently become an important research topic, resulting in a number of models for protecting access to provenance. Existing work has focused on graph transformation mechanisms that supply a user with a provenance view that satisfies both access control policies and validity constraints of provenance. However, it is not always possible to satisfy both of them simultaneously,...
With the rapid development of software defined networking and network function virtualization, researchers have proposed a new cloud networking model called Network-as-a-Service (NaaS) which enables both in-network packet processing and application-specific network control. In this paper, we revisit the problem of achieving network energy efficiency in data centers and identify some new optimization...
The purpose of this paper is to propose new model for emotional interaction that uses learning styles and student emotional state to adapt the user interface and learning path. This aims to reduce the difficulty and emotional stain that students encounter while interacting with learning platforms. To this end will be used techniques of Affective Computer that can capture the student emotional state...
K-means is the most widely used clustering algorithm due to its fairly straightforward implementations in various problems. Meanwhile, when the number of clusters increase, the number of iterations also tend to slightly increase. However there are still opportunities for improvement as some studies in the literature indicate. In this study, improved implementations of k-means algorithm with a centroid...
Simulation has been demonstrated to be a powerful tool to mimic processes and activities in emergency departments. However, most applications only rely on the data that were manually input by the staff in the departments. First, this practice does not guarantee that the required data to build the simulation models are captured in the computer system, as some information about the processes of emergency...
Computing models provide the parallel and distributed algorithms for cloud. The ability to estimate the performance of parallel computing models for efficient resource scheduling is critical. Current techniques for predicting the performance are mostly based on analyzing and simulating. The behavior of parallel computing model directly leads to the diversity of mathematical model. Without a general...
Developed a method for computer analysis of the microparticles motion parameters along trajectories, based on the proposed A. A. Vavilov principle consistent disclosure of structural, parametrical and signal uncertainty. Signal uncertainty is caused by instrumental and methodological errors in the localization of microparticles position in the trajectories resulting from image processing. The difference...
Web based computing technology and services has proliferated exponentially and seen mammoth growth in the way people interact with systems across the globe since last decade. Nowadays user community has turned into contributor community and interactive social web platforms have made them empowered for global content creation and consumption. This content exploding is continued and ever increasing...
Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal...
The Technology Leaders Program (TLP) is an interdisciplinary undergraduate program at the University of Virginia. The program has recently received a grant to purchase materials that will support its mission of fostering a maker culture. The TLP faculty advisors recognize that the current pencil-and-paper method of tracking their assets would not effectively and efficiently work with a larger inventory,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.