The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal “compromising...
Quadratic assignment problems one of combinatorial optimization problems that pays to number of facilities to number of places. The objective is to minimize the cost. QAP is one of the degree of complexity of hard problems deterministic algorithms are able to solve smaller sample problem. Fast local search used to solve qap. but despite the wider space exploration. There are not certain views for...
According to [8] the student's learning inspiration and adequacy can be influenced by several environmental factors which includes the learning approach and social pressure from class mates. The aim of this study is to investigate students' perceptions about the contribution of collaborative learning and the Hackathon to improve computer programming pass rate. The study included both the under-graduate...
This paper is devoted to the development of mathematical model and information technology for computer analysis of medical diseases based on investigations of cardiograms. Authors propose to use cardiogram recognition algorithm which is synthesized on the mathematical base of nonlinear canonical decomposition of random sequence. The automation process of cardiograms recognition, analysis, classification...
Advanced information technology offers greater convenience to the general public. However, information technology can cause failures that have significant negative impacts (e.g., system failures and personal information leaks). To improve this situation, it is important to understand past failures, extract their causes, and define countermeasures. In this paper, we focus on communications networks...
With the advent of the era of big data, the traditional teaching mode has been changed greatly, and it opens up a new teaching approach for classroom teaching. Under the perspective of the era of big data, and based on the analysis of the characteristics of the era of large data and the characteristics of the traditional teaching mode, the reform and innovate of chemistry teaching mode was taken from...
In the process of communication the information gets corrupted. Therefore, the signals received by the receiver which is different than the actual information signal. This paper stated that how receiver detect the errors in received signals and how does receiver rectify that error by using hamming code method. We have illustrated with the help of examples that how receiver identified which bit is...
Community detection is a fundamental problem in social network analysis. There are a large number of community detection algorithms in the literature. However, many previous algorithms only focus on the structure of the network, and ignore the attributes of the users (e.g., the location attributes of the users). In this paper, we study the community detection problem in the context of location-based...
Social Networking Services rise rapidly in recent years, and gradually penetrate into the user groups all over the world. Sina Microblogging is one of the important applications and has more than 500 million registered users. Huge number of users on the platform and the mass content, provide effective corpus for information mining in groups of users. In this paper, more than 1.6 million user-generated...
GPS-enabled mobile devices such as smart phones and tablets are extremely popular today. Billions of such devices are currently in use. The application and research potentials of these devices are limitless, but how accurate are these devices? The research team used Average Euclidean Error (AEE), Root Mean Square Error (RMSE), and Central Error (CE) to define and calculate the accuracy and precision...
High-dimensional crowdsourced data collected from a large number of users may produc3 rich knowledge for our society but also bring unprecedented privacy threats to participants. Recently differential privacy has been proposed as an effective means to mitigate privacy concerns. However, existing work on differential privacy suffers from the "curse of high-dimensionality" (data with multiple...
In online social networks (OSNs), highly-connected users are generally more capable to trigger viral diffusion. However, recent research demonstrates that ordinary users who only have a few connections can also cause large-scale diffusion. In this paper, we study the relation between the global spreading influence and the local connections of users to theoretically explain this phenomenon. We focus...
Discriminant Neighborhood Embedding (DNE) is one of the most popular methods for dimensionality reduction, which constructs an adjacency graph to preserve the local structure of original data in the subspace. However, there exist two shortcomings, first, DNE just constructs an adjacency graph, which may not achieve the goal of balancing the within-class and between-class samples. Second, DNE cannot...
Routing messages in sparse and intermittently connected networks is one of the major challenging issues in Delay Tolerant Networking as an end-to-end path between the source and the destination is absent most of the time. To deal with this problem a wide range of routing protocols have emerged over time. One such protocol is MaxProp — which prioritizes both the schedule of packets to be transmitted...
The School bus routing and scheduling can be treated as a multi-objective Vehicle Routing Problem (VRP) that helps to transport the students in the safest, most economical and convenient way. The objective of this paper is to optimize the overall transportation cost by minimizing the fleet of vehicles and time spent in the journey. In this research, a Geographical Information System (GIS) based solution...
Location-based social network (LBSN) services are being popular at recent times. These are being manifested as service tools for different purpose of our daily lives. One very important aspect of these LBSNs services is to promote the business and help users to find their desirable location to visit. In this project, our aim is to find out the Foursquare venue popularity in Taiwan and compare its...
Online reviews are becoming one of the vital components of e-commerce in recent years as so many people consider having different opinions prior to buying online products or apprehending any online service. Nowadays, in the era of web 2.0, it is completely understandable that people rely on online reviews more than ever while taking a decision. However, guaranteeing the authenticity of these sensitive...
Sentiment is the only things that separate human and machine. To simulate the feelings for machines many researchers have been trying to create method and automated the process to extract opinion of particular news, product or life entity. Sentiment Analysis (SA) is a combination of opinions, emotions and subjectivity of a text. Currently SA is the most demanding task in Natural Language Processing...
Barreto-Naehrig (BN) curve is a well studied pairing friendly curve of embedding degree 12, that uses arithmetic in Fpi2. Therefore the arithmetic of Fp12 extension field is well studied. In this paper, we have proposed an efficient approach of arithmetic operation over the extension field of degree 18 by towering. Fp18 extension field arithmetic is considered to be the basis of implementing the next...
Meeting is a gathering of people to exchange information and plan joint activities for achieving a goal through verbal interactions. In a good meeting, participants' ideas are heard, decisions are made through discussions and activities are focused on desired results. The challenging part is to mine the most relevant interaction pattern from the meeting. Tree structures are not able to capture all...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.