The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The vast amount of online documentation and the thriving of Internet especially mobile technology have caused a crucial demand to handle and organize unstructured data appropriately. An information retrieval or even knowledge discovery can be enhanced when a proper and structured data are available. This paper studies empirically the effect of pre-selected term weighting schemes, namely as Term Frequency...
This present paper relates Danger Theory of Artificial Immune Systems, which has been introduced by Polly Matzinger in 1994 with the application in risk assessment. As to relate the concept of Danger Theory in risk assessment, a situation of determination severity level for detected Short Messaging Service (SMS) spam is applied. However, further testing is needed as to demonstrate the explained concept...
In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better management...
In this study, the discrete-time performance of BLUE algorithms under bursty and correlated traffics is analyzed using two-state Markov-modulated Bernoulli arrival process (BLUE-MMBP-2). A two-dimensional discrete-time Markov chain is used to model the BLUE algorithm for two traffic classes, in which each dimension corresponds to a traffic class and the parameters of that traffic class. The MMBP is...
Researching about adult workers' adoption reflected to organisation and individual in developing countries are needed due to obtaining better and bridge the gap. In addition, previous empirical studies that conducted on e-learning have shown low adoption rate among e-learners in Jordan. This study aimed to examine factors such as relative advantage, compatibility, complexity, information quality,...
The username/password combination is still the most widely used method albeit various user authentication techniques have been introduced. Numerous studies have been conducted to investigate the scheme and it could be summarized that despite it weaknesses, it is the most favourable scheme. Thus, to reduce the weakness, authenticating users with image or pictures (i.e. graphical password) is proposed...
The functional need of executing transaction on Electronic Commerce has made security a necessary built-in feature. Also, placing the E-Commerce portal in cloud through cloud computing technologies has undoubtedly increased the security challenges. Thus necessitate a design of secured authentication framework to be employed by the web-based E-Commerce portals. Existing works on XML-based authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.