The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Email has become widely used in recent years bringing with it new problems. Although this event doesn't happen often, misdirected emails can bring out great information leakage. It is not easy to detect these misdirected emails from legitimate ones since they may be only distinguishable in the sender's perspective. Existing methods discover misdirected emails from user agent or gateway but are not...
Cloud computing represents a modern concept in the area of informatics, consisting of a distributed assembly of computational services, applications, access to information and data storage, in such a manner that the user does not need to know the placement and physical configuration of the systems supplying theses services. There is no assimilated Romanian translation for the term cloud computing...
A cyber physical system for smart cloud-driven traffic control is proposed. It is an intellectual (smart) road infrastructure for monitoring and control of traffic in real-time through the use of global systems for positioning and navigation, mobile gadgets and the Internet in order to improve the quality and safety of vehicle movement, as well as for minimizing the time and costs when vehicles are...
C4I (Command, Control, Communication, Computer and Intelligence) systems became the core of the command and control operations in military, emergency response, disaster management etc. The data sets used by these systems are large and complex to analyze and analysis process take long time. In today’s scenario the quantity of information or data that is traveling over the internet is not only huge...
Cyber espionage campaigns and cyber attacks make use of data exfiltration on a regular basis causing damages for billions of dollars. Nowadays, they represent one of the primary threats, and they are performed by criminals, companies and states. Normally, data exfiltration uses classic application-layer protocols (e.g. FTP or HTTP) in combination with very basic obfuscation mechanisms. Even though...
In Auctioning goods intelligent agents have been used in a collaborative manner. Many agents come together and make a fully communicable multiagent system. This system will take decision on behalf of bidders and will work on various goal and objective which was decided by bidders. This system will improve the efficiency and decision taking ability in more transparent manner. Auctioneers can auction...
Applying the ant colony algorithm to select cooperative partners for virtual enterprise doesn't need any artificial intervention. On the contrary, it can find the best scheme which satisfy the constraints intelligently through the interaction of indicators. In this paper, social reputation of companies is considered as a implicit index, which conforms to requirements of contemporary business. At the...
This survey was done due to high non-satisfaction level of a usage system, known as e-Aduan, an electronic system used to generate electrical, mechanical, telecommunication, civil, landscape, infrastructure or facilities management complaint from user. e-Aduan is subscribed and handled by Universiti Teknologi Mara (UiTM), for all developers of 7 Private Fund Institution (PFI) Campuses located throughout...
The availability of up-to-date information to people is an important requirement in many scenarios such as companies and civil institutions. In this regard, most establishments either use websites, emails or notice boards. However, in developing countries internet access is not available to many people on their mobile devices because of high costs. Moreover, having an electronic notice board requires...
A Document Management System (DMS) helps store, search, track, share, and retrieve documents of different types including text files, spreadsheets, presentations, and images. A DMS is a core technology used by several companies for managing their electronic documents and is often the central component of content management systems. A DMS may be used locally, on a network, or in the cloud. A question...
For a service company, the very important persons (VIPs) can provide more revenues than regular customers. Even the number of VIPs is few, once operators miss or late to response calls from a VIP, the possibility of losing the revenues is potentially huge. Therefore, if a company needs to satisfy VIP's needs, the manager must provide two different services of call center. Because employee salary forms...
Product configuration enables companies to deliver customized products under the assumption that all the components and relationships between components are predefined. The premise that all the components and their relationships are predefined limits the effectiveness and accuracy of product configuration. In view of this, open configuration is proposed as an innovative concept to assist companies...
The growing usage of electronic systems in safety- and mission-critical applications, together with the increased susceptibility of electronic devices to faults arising during the operational phase mandate for the availability of effective solutions able to face the effects of these faults. When the target system includes a processor, one possible solution is based on running suitable test programs...
Our work is Motivated due to the Problem faced by the Company's of Business interruption and the time it take to recover Business data and Business process which lead them investing towards the process of Disaster Recovery. In order to this problem we aim to give a method which will include the Disaster Recovery Planning (DRP) and Business Resumption Service (BSP) with the help of Cloud Computing...
Nowadays various companies are arousing in our surroundings for customer or owner need in an area. To compete with the modern computer based technology, every company installs the computer in their office. In first case, some company at first design the map of computer network from some observation like company area, what will be the best design practice of the network?, what will be the amount of...
To understand the structure of a trade market, network analysts search for patterns in the link structure of the network with the help of so-called blockmodeling algorithms. We present a new combinatorial way to measure the deviation of a network from having a given pattern. We show that even though the computation of the deviation is NP-hard, it can be efficiently solved to optimality by a branch-and-cut...
Self-directed learning skill and workability of an employee play a major role in continuous improvement of company. Several documents report the dominance of facilitator on development of those skill and performance. This paper presents a survey of perceptions of involved participants and their supervisors towards the quality of the constructionism-based employee developmental program so called the...
It has become common to operate an IT system where client computers in offices in a country access cloud computers in another country via the Internet. On the other hand, in some countries including China, network communication is often shut down by governmental bodies, in addition to network outage caused by network attacks. In the presence of these intentional or deliberate interruptions, users...
Computing field has been revolutionized in last three decades throughout the world. A large number of universities are offering undergraduate Computer Science and Software degrees in Pakistan. It is an imperative for high school students to know convergences and divergences between both degree programs before securing admission. The trend of introducing undergraduate Software Engineering degree in...
The strategic benefits of computer based information systems have been well documented in the literature. In the same light, researchers have also unveiled various factors that promote strategic uses of computer based information systems. Among the identified factor is information technology infrastructure flexibility (ITIF). However, previous studies focusing on the contribution of information technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.