The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Big data analytics are very fruitful for solving problems in cybersecurity. We have analyzed modern trends in intelligent security systems research and practice and worked out a syllabus for a new university course in the area of data mining and machine learning with applications to cybersecurity. The course is for undergraduate and graduate students studying the cybersecurity. The main objective...
Social networking websites are used today as platforms enabling their users to write down almost anything about everything. Social media users express their opinions and feelings about lots of events occurring in their daily lives. Lots of studies are conducted to study the sentiments presented by social media users regarding different topics. Sentiment Analysis (SA) is a new field that is concerned...
The ideological and political education is facing new and greater challenges in the large data environment. In the current environment, the full use of information technology to carry out ideological and political education work, is the effective strategy to adapt to the big data environment. This paper mainly introduces the new situation of College Students' Ideological and political education, and...
Insurance data processing system used by PT. Asuransi Takaful Umum is a system Care Tech. Care Tech System is a system designed for general data processing such as vehicle insurance, fire, property, and others with a web-based base that can be accessed online. During implemented since October 2013, Care Tech system has not been evaluated in terms of user acceptance. The purpose of this study was to...
Metamorphic malware have different code structure but exhibit similar functionality. These viruses have the capability to morph its code after each iteration. This diversity in the structure generate different binary string for variants of same base malware. Consequently, signature based scanners fail in detecting metamorphic malware. This paper describes a statistical approach for detecting metamorphic...
Polyphonic signal analysing process becomes the basic topic of signal analysis currently. Furthermore, analysis on the signal of music is also becomes the part of this topic. The main chosen instrument is sasando. As the matter of fact, this is not only about its characteristic sound but also because of the need for the preservation of this musical instrument which is about getting to be abandoned...
In this paper, we propose an automatic segmentation and detection of heart sound components (S1, S2, S3 and S4) which incorporates Empirical Mode Decomposition (EMD) denoising, autocorrelation-based cardiac cycle calculation, Shannon energy envelope extraction, first derivative peak and boundary detection, and real peak selection using Heron's formula. The proposed method is evaluated on synthetic...
In this paper, we consider the low probability of intercept (LPI) property of the binary Sidel'nikov sequences. We derive the LPI property of the sequences by deriving the triple autocorrelation bound of the binary Sidel'nikov sequences. The derived bound is approximately twice of square root of the period of the sequences, which is similar to that of the binary Legendre sequences.
Acoustic radar has the advantages of low cost, high resolution, and the simplicity for sampling and storage. Recent years, it has been widely studied and applied in fields such as target detection, recognition and imaging. However, the sound signal is usually wideband. The wideband correlation function is often used in active and passive detections. To address the problems of the errors and computational...
This paper presents the analysis of fourteen universities Institutional Repository based on webometrics (IR webometrics) ranking and their relation to the universities position in the UI greenmetric ranking. The UI Greenmetric ranking provides opportunities for each university to examine their strength and weakness in promoting green university and sustainable development based on six indicators....
Parkinson is a disease attacking the nervous system and worsens the work of nervous system over time. This disease is incurable, the therapy existing today is only able to help to relieve the symptoms. Hence, an early diagnose is deemed essential to determine an accurate type of therapy. Parkinson disease can be diagnosed by examining the symptoms apparent to the patient. One of the symptoms is the...
This paper proposes a new framework to identify and rank Twitter accounts of which short messages or tweets may influence a specific financial stock price. In this paper, we start by mainly focusing on the first step of our framework, selecting potential influencers based on their association with a particular stock market. With numerous limitations of Twitter service to access and acquire Twitters...
Despite being a developing country, Nepal has been able to stay on the track, though in a very limited sense, with the digital, informational and technological modern world. This article sheds light on specific challenges faced by Nepal to fully implement the prospects of internet education, the present state of it in terms of digital internet exposure and some statistical procedure to justify our...
In the paper we revisit, and further analyze the concepts of two possible representations of Atanassov's intuitionistic fuzzy sets' (A-IFSs, for short): the two term one, in which the degrees of membership and non-membership are only involved, and the three term one, in which in addition to the above degrees of membership and non-membership the so called hesitation margin is explicitly accounted for...
Feature selection algorithm in intrusion detection, data mining and pattern recognition plays a crucial role, it deletes unrelated and redundant features of the original data set to the optimal feature subset which are applied to some evaluation criteria. Due to the low accuracy, the high false positive rate and the long detection time of the existing feature selection algorithm, in the paper, we...
While a defense system is being acquired using simulation-based acquisition (SBA), part of the system would be described as hybrid systems that have both discrete and continuous components. Also we need to quantify the benefits of SBA somehow in order to clearly determine them. In this paper we propose a method for cost estimation of hybrid system models that are specified based on a formalism for...
This paper investigates how different individual and institutional factors pertaining to ICT readiness influence teachers' adoption of game-based learning technologies. The data were gathered from Finnish primary, lower secondary and upper secondary school teachers (N=1668) with an online survey. The results indicate that openness towards ICT, ICT attitude and the ICT compatibility with teaching positively...
Many nations worldwide are continuing to invest in electronic government (e-government) initiatives that now demand an investigation into how well users perceive the success of these initiatives. Currently, there exists a dearth of empirical evaluation of e-government success in particular for the Australian context. Our research project, reported in this paper, is concerned with developing a conceptual...
Experience based factory and knowledge management are distinguished concepts in managing organizational knowledge and experiences. In software development, requirement engineering is a very crucial process; in addition, it is knowledge-intensive, repetitive and time-consuming activity. Knowledge and experiences in requirement engineering should be managed systematically and efficiently for sharing...
Internet technology developed fast in recent years, it provided more mature development environment for e-learning. E-learning technologies have been widely used in private business or school, it usually through a CAI system which has been established completely, then can make learners freely use after classes on the network platform. Web-based learning is a technology-mediated learning that learners...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.