The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Students in Indonesia have been cutting classes for some time now and it has become a bad habit. They leave their house towards their educational institutions, either school or college, but in fact, they go somewhere else. The issue was supported by the lack of communication between the school and parents related to student attendance. Dealing with the problems mentioned above, it is needed to create...
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail...
Similarly to computer operating systems which guarantee safe access to memory resources, Network Operating Systems shall grant SDN applications a reliable access to neatly organized flow table resources. This paper presents the architecture for a controller-agnostic Memory Management System and some of its functionalities that aim at improving flow table usage and preventing network misconfigurations...
Hardware management and resource tracking is an important activity in maintaining labs at institute and offices. The resources are spread across various labs; some of the systems are at different location of the office. The monitoring of these systems is itself a tedious task. In this paper a ‘Resource Tracker’ methodology is proposed that provides a method to track remote resources by identifying...
This paper presents the methodology and its correspondent software conceived by Daimon Engineering to propose the medium voltage distribution system work plan of CELESC. To accomplish this job, a specially designed computer program has been created to take into account several technical variables, according to the type of problem (overcapacity of conductors and voltage drops). As a result of this...
In this paper, we propose a new model for parent alerting and automatic attendance marking using of RFID (Radio-Frequency Identification) and GSM(Global System for Mobile Communication). This system will enable automated and reliable attendance, informing parents and school administration about the same. For implementing this system each student and professor will be having a unique RFID card. A micro...
A versatile framework for automation of sophisticated farm machinery has been proposed in this paper. The paper details the functional design and development of the hardware and software architecture of the framework for electronic monitoring and control of a complex system. The framework aims to provide a user friendly bridge between the digital world and the physical world and covers the core software...
Accessibility is an important aspect of websites generally and public websites particularly. Many ways could be proposed to enhance accessibility, however the impact of selected actions is hard to predict due to diversification and contradiction, in addition to the existence of the time factor. A System Dynamics simulation model including factors affecting the accessibility of Norwegian municipal...
Prefixspan algorithm with GRC constraints which generates sequential patterns by using prefix projected pattern growth approach is implemented. Other than frequency this algorithm also uses gap, compactness and recency constraints during sequential pattern mining process. The gap constraint applies limit on the separation of two consecutive transactions of discovered patterns, recency constraint makes...
One of the important approach in data mining is sequential pattern mining that is used for discovering behaviors of sequential databases. There are various challenges in sequential pattern mining such as efficiency and effectiveness. In this paper different sequential pattern mining algorithm are discussed such as GSP, FreeSpan, PrefixSpan, and CAI-PrefixSpan to improve performance to finding sequential...
In this paper, we describe a process that has been developed to transfer network intrusion data captured by Fail2ban to an adaptive enterprise intrusion detection and prevention system. The process involves software agents that we have created that are interconnected to a central behavior analysis database service where each software agent records attack meta-information collected during previous...
Today most of the search engines do not find massive online data (invisible web) that are hidden behind. Web users depending upon search engine, could not access significant amount of data on the web. This is because search engines respond by returning few results based on ranking function. In this paper we develop an efficient crawling algorithm to obtain the hidden data with checkbox interface which...
The traditional pure software emulation mode and sandbox mode simulation systems can only analog computer interlock operation, lacking simulation of field devices, and cost a lot in installation and maintenance. To solve this problem, we introduce a new network computer interlocking simulation system, which is designed based on B/S mode, ASP.NET and Web 3D technology. Being put into practice, it proves...
Health care system's instantaneous answering method using machine-learning process has hindered the cross-system operability and the inter-user reusability. The scheme consists of two naturally reinforced components of database, namely Local Repository and Web. Primarily the user can access the local-repository database with simple keywords for the health data from the local repository. In other cases,...
Steganalysis when performed blind is a challenging task providing no clues for the steganalyst. Stego media will influence this process if Steganalysis is performed over clean and uncompressed image formats as such formats do not show off embedding distortions easily. If steganalysis needs to identify low volume payloads, it is yet another concern to unearth and highlight the feeble and delicate artifacts...
In recent days, web searching and security of the archives plays most incredible progress. The enduring research prototypes many web search show the result by searching the relevant data alone. Due to the mere relevancy search, the users may loss some useful data which are not included in the search result. Moreover, it also may consume more time by searching the data sequentially. To overcome these...
The software is an important part of the computer. With the widespread application of computer, software development is toward large-scale, standardization and wide generalization direction. In order to improve present situation and problems of software development, a novelty software design method is provided in this paper based on hierarchical technology, and its values and valid is analyzed and...
This paper provides a comprehensive survey on the recent techniques of human activity recognition. The goal of the activity recognition is to automatically analyze the ongoing events. The applications of activity recognition are manifold, ranging from visual surveillance to control and video retrieval. The task is challenging due to variations in recording settings of people, environment and scene...
This paper is devoted to the problem of modern methods for evaluating the quality of welds. One of the methods of the weld quality evaluation is visual inspection. This work deals with the possibility of implementing algorithms of recognition and evaluation of welds using visual system in single-board computers. This single-board computer can also communicate with Android smartphone which is a very...
Lectures are one of the medium used in Teaching-Learning strategy. However, amount of knowledge gained by the student is not always equal to the amount of knowledge shared in the lecture. This can be due to several reasons like long lecture hours, lack of concentration of student and many others. If the concepts which are not clearly understood are pre-requisite to understand next/other concept/topic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.