The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For a large sum of data collected and stored continually, it is more and more necessary to mine association rules from database, and the Apriori algorithm of association rules mining is the most classical algorithm of database mining and is widely used. However, Apriori algorithm has some disadvantages such as low efficiency of candidate item sets and scanning data frequently. Support and confidence...
The growing crime rate of any country is always one of the biggest obstacles to its growth and development. With more manpower it certainly helps to keep the crime rate at bay, but is manpower the ideal solution? No. This may come as a surprise that despite Big Data being the boom of the century is yet to take firm roots when it comes to helping solve a Criminal Investigation. With the aim of changing...
This paper gives details about web-based department automation system which will be implemented at educational institution level for maintaining faculty details and records. The proposed application aims at providing efficient and hassle-free working environment for faculty of the organization as it reduces the amount of paperwork involved. This system is based on the modern approach of data mining...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
Devanagari is an alphabetic script which is used by different Indian languages such as Marathi, Hindi, Konkani and Nepali. This script consists of 13 vowels, 34 consonants and 10 numerals. Due to unconstrained shape and variation in writing style, recognizing such handwritten script is challenging task. This paper proposed a system for recognizing handwritten numerals and vowels of Devanagari Script...
Now-a-days, providing a platform, where customers can obtain first-hand assessments of product information and manufacturers can collect customers reviews cum feedbacks to improve the product quality, is the prime need of any organization. These reviews are the people's opinion about particular product. Every website has reviews of their product and those reviews are difficult to analyze. Thus, the...
The recent advancements in Ad-Hoc networks opens vast areas for automation, Electricity board billing system is one of lagging areas where there is need of automation, mostly meter's readings are taken using an employee working for electricity board, customarily a photograph of each meter is taken. To provide a possible solution on these issues is automation in meter reading collection process, so...
Android enabled mobiles/devices are high in use by huge number of users for various purposes. Other than for just calling, most of the users are using these devices for storing and maintaining important data such as personal information, calendar schedules, photos, videos, office documents and much more. These devices are also used for chatting through various instant chat messaging and social networking...
ERP application performance can be complicated, as it's ought to satisfy the prerequisite and desires of some of the greatest and most refined enterprises inside the world. Odoo is in vogue ERP application comes into picture, Odoo-ORM framework written in python. This paper concentrates on essential component of Odoo-ORM i.e. caching. Caching can be one of the important parts of an ORM application...
Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize...
Domain adaptation has achieved promising results in many areas, such as image classification and object recognition. Although a lot of algorithms have been proposed to solve the task with different domain distributions, it remains a challenge for multi-source unsupervised domain adaptation. In addition, most of the existing algorithms learn a classifier on the source domain and predict the labels...
Adequate healthcare has always been a topic of concern in Bangladesh. As the population of Bangladesh is increasing exponentially, it has become impossible to deliver proper healthcare to all of its residence. For that reason alternate resources for healthcare have become almost a necessity today. Modern world is driven by technology and electronic healthcare system can be the solution we are looking...
In this paper we present a new Smart Online Vehicle Tracking System for Security Applications (AMOTSSA) and we describe how it can be modelled and implemented as a Big data application. In order to model AMOTSSA as a big data application, we argue our design choices that meets its specific data and processing needs and we present a set of data analytic algorithms that would achieve a set of investigation...
Quantum computing field is evolving rapidly these days. The difference between this new field and the classical field is the extension of the main domain from just using two bits (0, 1) to a complete space which is the result of the superposition of the same mentioned bits. By applying the superposition property in the quantum algorithms, this ensures that the system is more secured than the classical...
This paper accompanies panel contribution of the author to the session devoted to personal reminiscences of Professor Zdzisław Pawlak, a computer scientist and engineer. In particular we discuss some aspects of the work of Pawlak and researchers in his circle of collaborators in 1960ies, and especially, 1970ies. Given the lack of archival materials, the author bases this writing on personal recollections...
Regression testing is the way to ensure the current version of the program is up and running. Continuous testing throughout the development cycle leads to detecting bugs as early as possible; however, it imposes huge overhead if the entire test suite has to be run. In this paper, powered by the goal of early detection of bugs, a regression test selection technique is proposed. The proposed technique...
Recently, Wu et al. introduced a general approach based on distributed computing named Job-Level (JL) Computing. JL Computing has been successfully used to construct the opening books of game-playing programs.? In order to support large-scale computing problems such as solving 7×7 killall-Go, or building opening books for 9×9 Go or Connect6, record databases are used to store JL computing results...
When private data or sensitive information is stored in the database, a typical way to protect the data is to encrypt the data before storing it. For efficiently retrieving the data, an effective search mechanism is needed that works over the encrypted data smoothly. When data is encrypted the performance of querying the database is degraded. In this paper we are going through the various search techniques...
This paper introduces an FPGA-based scheme to accelerate mpiBLAST, which is a parallel sequence alignment algorithm for computational biology. Recent rapidly growing biological databases for sequence alignment require high-throughput storage and network rather than computing speed. Our scheme utilizes a specialized hardware configured on an FPGA-board which connects flash storage and other FPGA-boards...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.