The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents the results of a comparative study performed between two computational intelligence techniques, artificial neural networks (ANNs) and adaptive neuro-fuzzy inference systems (ANFIS) applied to particulate matter (fraction PM2.5) air pollution forecasting. The experiments were realized on datasets from the Airbase databases with PM2.5 hourly measurements. The main statistical parameters...
This paper proposes a new system of categorization and classification using data mining techniques based on certain criteria/topics. We describe the design and implementation of proposed system that automatically categorizes a restaurant as being good or bad, using data mining techniques, based on users' reviews. For this study we took a data set consisting of approximately 9,000 reviews for 2,355...
When performing the internal audit of computer equipment an important problem is to identify the elf (executable and linkable format) files stored on the investigated hard drive. To solve this problem, we propose a method of identification of unknown elf-ffles based on the metric classification algorithms. The method consists of three stages. On the first stage the preparation of the training sample...
Handwritten character recognition has been one of the most fascinating research among the various researches in field of image processing. In Handwritten character recognition method the input is scanned from images, documents and real time devices like tablets, tabloids, digitizers etc. which are then interpreted into digital text. There are basically two approaches — Online Handwritten recognition...
Training for forensic investigations is an important aspect of the overall training procedure in Police Academies around the world. However, the overall complexity of forensic examinations and the sensitive nature of data available in crime scenes limit the possibility of exposing police cadets in different types of real crime scenes. In this paper the plausibility of using dedicated computer games...
Coding (programming) is a skill that nowadays is considered as an important asset. Teaching programming is an activity that becomes more and more popular. In the last few years there are great discussions on inclusion of coding in schools. These initiatives impacted the policy makers in Macedonia to include coding as a part of a new compulsory subject for the pupils at the age of 8. In this paper...
A dedicated methodology for the production of MOOC videos has been implemented within the IN-CLOUD project, to guide all the partners, participants, and stakeholders, who will have to record them. In this case, the expertise needs have been achieved by the design and implementation of online courses for both open education (OCW and MOOC) and formal life-long learning technical courses. This paper...
The aim of this study was to investigate the attitudes of female student nurses studying at the Technical Institute for Health Training in Riyadh City to the use of Electronic Medical Records. The findings of the study, which involved 56 female student nurses show that there is no significant relation between years of prior computer experience and knowledge or attitude toward EMR, although there is...
Laboratory education is very important and plays a vital role in science and engineering courses. The cost needed for the setting up of a good laboratory can be huge and expensive to institutes that are heavily resource constrained. The rapid development of information and communication technologies, on the other hand, has had a remarkable change in the education system. This paper provides a comprehensive...
In recent years, the web has become one of the main carrier of social public opinion, so the network public opinion needed a new natural language processing technology to identify the information efficiently and accurately, analysis and classify the public opinions effectively. In this paper, the text semantic orientation analysis method is proposed based on Hidden Markov Model to improve the accuracy...
Computer programming subject is a core ingredient for most of the engineering disciplines. However for the first year engineering, teaching and learning fundamentals of programming language like C has been considered as a great challenge to both teachers and novice learners. The challenges in learning the programming languages are: the learners are not able to analyze the flow of program, cannot fix...
Network Intrusion Detection Systems must effectively identify security threats and protect the applications. The focus of the paper is the presence of class imbalance problem in intrusion datasets. An efficient intrusion detection system must accurately identify all threats even if they form a small fraction of the intrusion data. The effect of class imbalance on the benchmark NSL_KDD dataset is evaluated...
Divergent thinking is the process of generating multiple solutions for a given problem, while convergent thinking is evaluating and selecting accurate solution based on constraints, assumptions, and pros and cons analysis. Divergent and convergent thinking is an important thinking skill needed to generate novel or innovative solutions to a given problem. According to ABET guidelines, it is also one...
User performance in virtual environments with degraded visual conditions due to low frame rates is an interesting area of inquiry. Visual content shown in a low frame rate simulation has the quality of the original image, but persists for an extended period until the next frame is displayed (so-called high persistence-HP). An alternative, called low persistence (LP), involves displaying the rendered...
Classification systems adapts many machine learning techniques for quality performance in data classification. The neural networks has some unique characteristics and features which can handle high dimensional features and documents with noise and contradictory data. Classification is important to classify the input text into different domains appropriately. This paper give out a move towards classification...
Increased usage of multilevel security is noticed along with a rise in vulnerabilities for password based authentication. This is a level III security protection by authentication, which uses handwritten signature using mouse movement. User mouse behavioral pattern based security is a paradigm for online security layers. It uses digital signature to establish authentication with a secure system. The...
The earlier remote password authentication schemes required a service providing server to authenticate a legitimate user for remote login. However, the traditional schemes are not useful in multi-server architecture because of multiple user ids and passwords. In this paper, we present a remote password authentication scheme for multi-server architecture that can be robust and improved network security...
The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. In this paper, we reviewed snort as misuse based intrusion detection system as well as ALAD, PHAD, LERAD, NETAD as anomaly based statistical algorithms.
Simulators often implement their own solution for aggregating and saving user performance data. Aggregating user performance data from simulators that execute on many different machines can be a pain for researchers and the data is often saved in one format that can be hard to translate to others. A framework is proposed to provide re-usable scenario initialization and user performance data aggregation...
Machine learning programs are non-testable, and thus testing with pseudo oracles is recommended. Although metamorphic testing is effective for testing with pseudo oracles, identifying metamorphic properties has been mostly ad hoc. This paper proposes a systematic method to derive a set of metamorphic properties for machine learning classifiers, support vector machines. The proposal includes a new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.