The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Functional magnetic resonance imaging, in particular the BOLD-fMRI technique, plays a dominant role in human brain mapping studies, mostly because of its non-invasiveness and relatively high spatio-temporal resolution. The main goal of fMRI data analysis has been to reveal the distributed patterns of brain areas involved in specific functions, by applying a variety of statistical methods with model-based...
This paper provides that when the beam current increases to a certain level, the number of ions must be increased and the space charge effect must be added in accelerator physics in order to gain high precise status of ions. It's needed high performance computing to complete this work which needs TFLOPS level capability. So, a PC cluster based on Beowulf architecture and MPI2 was constructed, we put...
The purpose of this study is to design a computational thinking curriculum standard for K-12 education. The Delphi technique was employed to collect different views and derive consensus from a panel of thirteen experts, including computer scientists, computer science educators, K-12 computer teachers, and industry experts. The first draft of Delphi survey questionnaire, consisting of nine themes (problem...
The paper describes a graduate course in qualitative modelling and process supervision which is given at the Technical University Hamburg-Harburg. The aim is to show the students a systematic way for describing, analysing and controlling dynamical systems on the basis of qualitative information. The course includes lectures about the theoretical background of the methods, exercises with the QuaMo-Toolbox...
Cyber-attacks have been evolved in a way to be more sophisticated by employing combinations of attack methodologies with greater impacts. For instance, Advanced Persistent Threats (APTs) employ a set of stealthy hacking processes running over a long period of time, making it much hard to detect. With this trend, the importance of big-data security analytics has taken greater attention since identifying...
This paper focuses on improving and build a discrete event simulation model for modeling outpatient pharmacy workflow queuing system with the intent of exploring options for designing an efficient the queuing system of KKUH outpatient pharmacy Riyadh KSA. Simulation models of existing workflows in the pharmacy for KKUH outpatient pharmacy were created using discrete event simulation software (Arena)...
Developed a Classification scheme of methods, principles and models of construction of hardware for implementation of function-specific drivers of primitive basic functions based on system analysis.
Foundations of the integrated theory of analytically defined and multifunctional data structuring on the basis of correlative, entropic, spectral, logical and statistical and matrix models of data movement have been presented in this article.
As modern simulations involve large inputs and outputs over the network, there is an increasing need to store, manage and analyze the massive datasets, efficiently. In this paper, we present ARLS (After action Reviewer for Large-Scale simulation data), a Hadoop-based output analysis tool for large-scale simulation datasets. ARLS clusters distributed storages using Hadoop and analyzes the large-scale...
Serious games are considered as powerful tools in learning and instructional purpose. Besides that, serious game also gains its own popularity among children and adolescence. Given the wide popularity of serious game, therapists realize the advantages of using games as the assistive tool in psychotherapy so called therapeutic game. However, the lack of available comprehensive guideline for design...
In this paper, we describe on-going work on the ensemble of two models for computational creativity using commonsense knowledge. The GENCAD model of computational creativity proposes the use of an evolutionary algorithm (EA) that employs a population of exemplars as a starting point for its search, unlike traditional EAs, which employ a randomly-generated initial population. The EA, operating on this...
Computer forensics investigators aim to analyse and present facts through the examination of digital evidences in short times. As the volume of suspicious data is becoming large, the difficulties of catching the digital evidence in a legally acceptable time are high. This paper proposes an effective method for reducing investigation time redundancy to achieve the normalization of data on hard disk...
Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters...
The key success of a general election is determined by the ability of voter information management system (Sipendalih) in preserving the accuracy and validity of voter's data. Sipendalih was designed to accommodate eligible voters who live overseas to participate in general election through not only registering themselves as voters but also monitoring the whole process of general election. This study...
This paper puts forward an analytic factor neuron model which combines reasoning machine based on the cloud generator with the Factors Neural Network theory. The factor neuron model is realized based on mobile intelligent agent and malicious behavior perception technology. Therefore, it, compared with the traditional security defense technology, has strong flexibility, mobility, scalability and other...
Vehicle classification system is an important part of intelligent transportation system (ITS), which can provide us the necessary information for autonomous navigation, toll systems, surveillance and security systems, and transport planning. In this paper, we introduce a vehicle classification system based on dynamic Bayesian network (DBN). Three main types of features are employed in our system:...
Synchronization and Time management are the important mechanisms for the parallel discrete event simulation. Time management ensures events are executed in the correct order without any repeated execution. Synchronization management is important in ensuring faster execution of synchronization procedure and while reducing the wait time for synchronization. In this paper, we studied about predicting...
E-Government increases transparency and improves communication between the government and the users. However, users' adoption and usage is less than satisfactory in many countries, particularly in developing countries. This is a significant factor that can lead to e-Government failure and, therefore, to the waste of budget and effort. Unlike much research in the literature that has utilised common...
This paper simulated the game in the policy-processing of grid construction based on the Rubinstein game ideology of bargaining, studied the interaction among main interest groups. The paper also introduced the stakeholder theory to the design of the compensation mechanism, and confirmed the compensation mechanism efficiency through the economic simulation method. This paper points out that in the...
Cloud Computing researches involve a tremendous amount of entities such as users, applications, and virtual machines. Due to the limited access and often variable availability of such resources, researchers have their prototypes tested against the simulation environments, opposed to the real cloud environments. Existing cloud simulation environments such as CloudSim and EmuSim are executed sequentially,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.