The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
In this paper, we present an animation developed in the Wolfram Mathematica System for the visualization of the m-convex hull of sets containing finitely many points on the Cartesian plane.
At present the institutions of higher learning attempt to be competitive for their applicants. Therefore, they look for new ways of attracting them. One of the ways is also the efficient use of modern technologies since the young generation entering these institutions is the so-called digital natives who perceive technologies as an inseparable part of their lives. The purpose of this article is to...
System-call analysis is recognized as one of the most promising approaches to malware detection due to its ability to facilitate detection of malware variants as well as zero-day malware. However, one of the key challenges of system-call based analysis - which prevents it from being used in real-time detection systems - is the excessive size/dimensionality of the system-call sequences that correspond...
The revolutionary developments in the digital technologies have indicated a requirement for technology, that systematizes the huge images dataset for easy search and retrieval. This yields an essential demand for developing highly effective retrieval systems. Recently, wide-ranging research efforts have been made in the field of annotated images. However, image Annotation can tag by one term, which...
SMS service is a basic feature that has been built into the cell phone, since a function of exchanging messages are practical and easily understood by all mobile phone users, when SMS is used for negative purposes then it can be used as evidence of the law. This applications was designed to help search a text messages as evidence in a crime that use SMS as a medium of communication, This Application...
In order to achieve a short regulation cycle time-optimal control has been considered in the past. However, implementation difficulties and sensitivity to errors and uncertainty have incited other research directions. In this paper, soft Variable Structure Control (VSC) is analyzed from the perspective of linear systems with input delay. Fast convergence under smoothly varying input signal is obtained...
This poster looks at adapting Intrusion Detection Systems solutions to multiple SDN based domains. We present a preliminary evaluation of the performance in terms of latency cost while offering IDS solutions as a service (IDSaaS) in SDN. The goal is to eventually be able to determine what resources are needed in order for the IDSaaS in SDN to perform in a manner that is almost comparable to running...
Preserving the content of historic handwritten manuscripts is important for a variety of reasons. On the other hand, digital libraries are rapidly expanding and thus facilitate to store this information directly in digital form. For digitising text documents, a crucial step is to binarise the captured images to separate the text from the background. In this paper, we propose an effective approach...
Social cognition is the study of how people interact with each other in a social situation. An effective interaction would require higher degree of cognitive involvement between the participants and consequently, an enhanced synchrony between their neural mechanisms. In this study, twelve pairs of subjects interacted with each other via a cognitively engaging experimental paradigm in which they either...
Commercial/Military-Off-The-Shelf (COTS/MOTS) Computer Generated Forces (CGF) packages are widely used in modeling and simulation for training purposes. Conventional CGF packages often include artificial intelligence (AI) interfaces, but lack behavior generation and other adaptive capabilities. We believe Machine Learning (ML) techniques can be beneficial to the behavior modeling process, yet such...
Individuals with Down syndrome should be adapted to society. As there are various projects to achieve this goal, one of them is establishing cafes where all waiters/waitresses are individuals with syndrome. The Down Cafe is the one of these cafes that is located in Istanbul, Turkey. In such cafes, some of the tasks are quite hard to be performed by individuals with Down syndrome, such as taking orders...
Human-computer dialogs are an important vehicle through which to produce a rich and compelling form of human-computer interaction. We view the specification of a human-computer dialog as a set of sequences of progressive interactions between a user and a computer system, and mine partially ordered sets, which correspond to mixing dialog initiative, embedded in these sets of sequences—a process we...
This paper describes an early step in approaching implicit meaning computationally. It outlines various types of implicit meanings and then presents a method of finding the so called defaults - omissions that are universally reconstructable and, of course, interpretible without much additional reasoning. The defaults are analyzed on the example of the 1000 instances of TerminateLife events, and a...
Taiwan government has recently promoted “Plan for Building Island of Exercise” which has leaded the trend of exercises and increased the needs of various healthcare and fitness products. Prior researches have also pointed out that listening to music with different tempos while exercising apparently affects heart rate, oxygen consumption, breathing rate and other physiological parameters. Among the...
Extensive use of computer network and huge amount of data had led several works to focus on intrusion detection system, which are based on single dataset or to combine multiple detection techniques to analyze detection rate and false positive flag.
Programmable matter i.e. matter that can change its physical properties, more likely its shape according to an internal or an external action is a good example of a cybermatics component. As it links a cyberized shape to real matter, it is a straight example of cyber-physical conjugation. But, this interaction between virtual and real worlds needs two elements. The first one is to find a way to represent...
Though some games for visually impaired persons have been developed, most of games that use only auditory information present challenges for sighted persons. Moreover, unfortunately, it is still difficult for visually impaired persons to play the same game with sighted persons and for sighted and visually impaired persons to share a common subject. Thus, we developed a barrier-free game that both...
A brain-computer interface (BCI) can operate a computer by analyzing electroencephalogram data. A BCI does not require body motion; therefore, the physically handicapped, such as those who suffer from amyotrophic lateral sclerosis (ALS), can also operate a computer. However, with ALS patients, attaching electrodes requires significant time and effort. In this study, we examine the number and arrangement...
We collect environmental information through our sensory organs, perceive them suitably to execute the task in hand. Examples of such tasks are abundant, like driving, operating machines, playing games, hunting, or mushroom picking on mountains. While executing such tasks, there is a marked difference in efficiency and accuracy between an expert and a novice. An expert is attentive to only what is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.