The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper explores the connection between Soren Hallden's logic of nonsense (and its expansions) and Logics of Formal Inconsistency (LFIs), one of the main traditions in paraconsistency. Although not much attention has been payed by paraconsistentists, Hallden's logic can be nicely connected to LFIs. The main result of the paper is a reformulation of an expansion of logic of nonsense studied by Lennart...
The protocols underlying large-scale geo-replicated storage systems implement a wide spectrum of transactional consistency criteria. These protocols typically execute in two phases: ● In the Execution phase, a transaction reads from a database snap-shot and buffers its updates. ● In the Termination phase, a multicast/2PC protocol commits updates atomically while performing a so-called certification...
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious...
Information overload may affects everyone who receives, processes and presents the information. When individual is over supplied with the information which is more than he/she can process, it leads to information overload. In dealing with this phenomenon, individuals sometimes do not realize they are overloaded until the symptoms appear. Hence, it is important to recognize the starting point at where...
For purpose of information management of film capacitor production workshop to provide convenience for production department management to grasp the production realtime data, in this paper, we design a film capacitor production monitoring system adopting the man-machine interactive information collection technology based on data acquisition and wireless network transmission. By the technology, we...
Rapid advances in web-based technologies and infrastructure are forcing change in the learning community. This study applies the Quality Matters (QM) Rubric (UoD synchronous template) to the LMS (Blackboard) used by 14 faculty members, applied to 14 courses, and directed to 348 students in Dammam Community College in accordance with a supporting eLearning ecosystem environment, applying John Keller's...
Classification between foggy and non-foggy images is a primitive step for automation in traffic activity and industries. The existing techniques provide low accuracy and needs validation over both synthetic and natural database. Foggy images are identified and classified based on their optical characteristics for vision enhancement and to make them more efficient for further processing. In proposed...
Medical image is an effective means to identify medical abnormalities. Patients typically have medical images taken at different clinics during lifetime, and they often wish to have second interpretation on medical images showing substantial diseases. With these two motivations, we design MIaaS which is a cloud service for archiving medical images and analyzing medical images by software and/or physicians...
Sparse representation classifier (SRC) is a classical method for classification, which was proposed in 2009. SRC method boosted the research of sparse representation, based on SRC, many other new methods were also proposed, such as structured-sparse representation, collaborative representation optimized classifier (CROC), deformable sparse recovery and classification (DSRC) method, misalignment robust...
Traditional methods of access control such as password token or identification card are being replaced by biometrics recognition technology in many fields because of their limitation in reliability and usability. Vein pattern identification is outstanding compared to other biometrics methods such as fingerprint or iris due to its dependability and ease of use. At the same time, current biometrics...
It is useful to employ electronic medical records to improve medical studies. Based on their experience, medical workers conventionally prepare clinical pathways as guidelines for the typical flow for the medical treatment of each disease. In this study, we propose an approach for verifying existing clinical pathways and recommend variants or new pathways by analyzing historical records. We propose...
The recent advances in sensor/actuator and RFID technologies have spun out a new healthcare model enabling capture and dissemination of patient vital signs over the Internet for ubiquitous monitoring of these patients anytime and from anywhere. This provides new opportunities for enhancing healthcare through participatory consultation, medical diagnosis and many other novel healthcare services. Some...
Every project or event involves series of tasks, activities, people, budget and deadlines. No matter how big or small the project is, the success or failure of the project depends on the execution plan and the order in which the tasks are fulfilled. It takes a great deal of skill to do this well, the time invested in building good project management techniques can pay off enormously and helps to achieve...
Since 1998, SQL injection were started. So many ways of doing SQL injection on different type of database. Attacks are happened on data-driven web application for exploiting the data of the server. Existing IDS base prevention system working on predefine rules. But they are not stable. So, in order to prevent database from SQL Injection Attack, we propose a model, which is implemented with SNORT and...
Electrocardiogram (ECG) is the most reliable and low-cost diagnostic tool to evaluate the patients with cardiac arrhythmias. Manual diagnosis of arrhythmia beats is very tedious due to the nonlinear and complex nature of ECG. The current paper, describes pattern recognition and machine learning-based approach for computer-aided detection of five classes of ECG arrhythmia beats using Discrete Cosine...
Data on World Wide Web has been growing in an exponential manner. This raises a severe concern on information overload challenges for the users. Retrieving the most relevant information from the web as per the user requirement has become hard because of the large collection of heterogeneous documents. One approach to overcome this is to personalize the information available on the Web according to...
Rapid expansion of network and internet services enabled users to use and share large amount of data on a massive scale. Once the information is combined, it becomes the wealth information which can be used for research. Researcher directly applies data mining techniques and algorithm on the original dataset to fetch information, which may leads to leakage of privacy data. Large amount of data leads...
With the recent advancements in the field of robotics and cloud computing, one technology backing the other can have a huge potential under the domain of Cloud Robotics. Majority of systems are still operating independently using on-board computation, and confined memory and storage. Cloud Computing is a promising technology which is intended to harness the power of networked computers and communication...
QRS detection is becoming more popular in detecting the heart beat rate. The improvement is done by using the new filter. This research work focus on providing better performance in heart beat detection algorithm by using hybrid filter (improving MaMeMi filter using the first order derivative filter). An enhanced algorithm has been proposed to enhance the performance of QRS detection. Different parameters...
Data loss, i.e. the unauthorized/unwanted disclosure of data, is a major threat for modern organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ patterns of known attacks (signature-based) or try to find deviations from normal behavior (anomaly-based). While signature-based solutions provide accurate identification of known attacks and, thus, are suitable for the prevention...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.