The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the existing studies, the quantification of human affect from brain signals is not precise because it is merely rely on some approximations of the models from different affective modalities rather than the neurophysiology of emotions. Therefore, the objective of this study is to investigate the cognitive-affective model for quantifying emotions based on the brain activities through electroencephalogram...
Cloud computing is a model that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Numerous studies have shown that by replacing traditional computing with cloud infrastructure, the total power consumption can be decreased because cloud computing power consumption is influenced by four key cloud factors: dynamic provisioning, multi-tenancy,...
Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block...
The improvements and capabilities of Business Intelligence (BI) systems are making them highly required by organizations in many of the fields. Day by day, the demand is increasing on these systems. Figures show that billions of US dollars are spent annually on BI systems. However, half of these BI projects are ending with unrealized benefit, according to some studies. As a participation to reduce...
Grid platforms serve a wide range of activities in life sciences, bioinformatics, engineering, healthcare and other industries. This paper identifies the key bioinformatics and healthcare computing models and services on grid initiatives and classifies and describes their current use in the industry. Based on what has been reported by the literature, the paper identifies eight key areas of interests...
Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic extraction...
The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire...
Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main...
The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of...
A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of...
Mobile marketing refers to different kinds of marketing that contain operation of mobile phone technology to achieve the target spectators. Commonly, people associate mobile marketing with SMS and MMS marketing, pay per call mobile marketing, mobile banner ads, quick response code, location based marketing, Mobile applications and mobile website design. Among the variety of mobile services, considerable...
In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.