Although static typing provides early type error detection,better legibility and abstraction,and more opportunities for compiler optimizations,dynamic typing supplies a high degree of runtime adaptiveness,providing an...
详细信息
Although static typing provides early type error detection,better legibility and abstraction,and more opportunities for compiler optimizations,dynamic typing supplies a high degree of runtime adaptiveness,providing an agile and interactive development suitable for rapid *** this article,the minimal core type system of a programming language which main aim is to provide the benefits of both dynamic and static typing is *** explicit typing,implicit type inference is introduced to combine dynamic and static typing in the same programming *** and intersection types are customized to express the dynamism of implicitly typed *** main benefits of our work are an early type error detection in dynamic code,the integration of dynamic and static code in the same programming language,and a notable optimization of the generated code.
Alerts correlation techniques have been widely used to provide intelligent and stateful detection *** is to understand attack steps and predict the expected sequence of ***,most of the proposed systems are based on ru...
详细信息
Alerts correlation techniques have been widely used to provide intelligent and stateful detection *** is to understand attack steps and predict the expected sequence of ***,most of the proposed systems are based on rule -based mechanisms which are tedious and error *** methods are based on statistical modeling;these are unable to identify causal relationships between the events. In this paper,an improved "requires/provides" model is presented which established a cooperation between statistical and knowledge-based model,to achieve higher detection rate with the minimal false positives.A knowledge-based model with vulnerability and extensional conditions provide manageable and meaningful attack *** proposed model has been implemented in real-time and has successfully generated security events on establishing a correlation between attack signatures. The system has been evaluated to detect one of the most serious multi-stage attacks in cyber crime - *** Botnet is analyzed within the realm of simulated malicious activities normally used by cyber criminals.
We propose an on-line signature verification method based on finite impulse response(FIR) system characterizing velocity and direction change of barycenter ***,the discrete cosine transforms(DCTs) of the characteristi...
详细信息
We propose an on-line signature verification method based on finite impulse response(FIR) system characterizing velocity and direction change of barycenter ***,the discrete cosine transforms(DCTs) of the characteristics are used to reduce fluctuation and extract the feature of handwriting in signing *** the signature verification system is realized by the three FIR *** obtained impulse responses of the three FIR subsystems are used as the individual feature for signature *** can be verified by evaluating the difference between the impulse responses of the FIR subsystems for a reference signature and the signature to be *** signature verification experiments were performed on the SUBCORPUS-100 MCYT signature database[6]consisting of 5,000 signatures from 100 signers.
<正>In the scope of Financial Watch project,in order to create a feature of a corpus reflecting its semantic structure,a general algorithm of text micro structuring and browsing is *** same conceptual algorithm has ...
详细信息
<正>In the scope of Financial Watch project,in order to create a feature of a corpus reflecting its semantic structure,a general algorithm of text micro structuring and browsing is *** same conceptual algorithm has been extended recursively to derive the macro feature of a space of documents, in an ascendant *** browsing system based on the extracted feature proved to help for a fast convergence to the user *** same tool is extendable for report generation from a corpus,based on a general *** main goal of this paper is to propose new experiences on document feature composition,in order to compare different varieties of algorithms and find out better paradigms with respect to some well defined criteria.
The specifications for many software systems, including safety-critical control systems,are often described using complex logical *** is important to find effective methods to test implementations of such *** the effe...
详细信息
The specifications for many software systems, including safety-critical control systems,are often described using complex logical *** is important to find effective methods to test implementations of such *** the effectiveness of the testing of logical expressions manually is a tedious and error prone endeavor,thus requiring special software tools for this *** paper presents Fault Evaluator,which is a new tool for experimental investigation of testing logical expressions in *** goal of this tool is to evaluate logical expressions with various test sets that have been created according to a specific testing method and to estimate the effectiveness of the testing method for detecting specific faulty variations of the original *** main functions of the tool are the generation of complete sets of faults in logical expressions for several specific types of faults;gaining expected (Oracle) values of logical expressions;testing faulty expressions and detecting whether a test set reveals a specific fault;and evaluating the effectiveness of a testing approach.
Feature extraction is an important and challenging phase of facial expression recognition *** this paper,an effective feature extraction method is *** facial feature representation method is based on an adaptive Gabor...
详细信息
Feature extraction is an important and challenging phase of facial expression recognition *** this paper,an effective feature extraction method is *** facial feature representation method is based on an adaptive Gabor wavelet *** this method,we used a fuzzy controller for tuning the orientation parameter of *** filter can detect the most significant edges of facial ***,the proposed adaptive filter improves the drawbacks of conventional Gabor *** neighbor and multi-class Support Vector Machine(SVM) classifiers are applied for classification task. Experimental results on Japanese Female Facial Expression (JAFFE) database show that the proposed method can provide high recognition *** main advantage of proposed method over other methods is its flexibility.
This paper investigates the effect of Information Technology on E-health;specifically,the development of IT/ICT and E-health/Telemedicine in *** to different research,some professionals believe that the development of...
详细信息
This paper investigates the effect of Information Technology on E-health;specifically,the development of IT/ICT and E-health/Telemedicine in *** to different research,some professionals believe that the development of IT/ICT could have the positive and direct impact on development of using E-health/Telemedicine in all health sectors that could lead to saving times and poor and disabled people can use best and complete medical facilities from far *** the other hand,some professionals believe that the best diagnosis is occurred when they have a face-to-face contact with patients. This paper reviews the development of IT and the effects that it could have on developing E-health and whether the development of E-health has any impact on preventing prevalence of HIV in Iran or *** this purpose,the IT/ICT and Health indicators are investigated and e-readiness score of Iran is investigated during the past *** conclusion is reached that the development process of both IT/ICT and E-health are in progress,but the former is faster and more sensible,also the IT/ICT development trend has an impact on preventing prevalence of HIV but it is not so sensible.
Over the past years research in pervasive computing has demonstrated the potential of context-aware and proactive technologies for improving human work performance and to ensure that people act compliant according to ...
详细信息
Over the past years research in pervasive computing has demonstrated the potential of context-aware and proactive technologies for improving human work performance and to ensure that people act compliant according to predefined regulations. Human work can be structured into tasks,whereas a task is representing an atomic human work entity.A person-centric flow is an IT-representation of the flow of activities an individual person is *** example the daily care schedule of a nurse can be understood as the person-centric flow of the nurse. To be able to effectively guide a person in a complex and highly dynamic work environment and to react on possible deviations from the flow the supporting system is required to be aware of the state of the *** guidance the flow information can be utilized to check compliance of a persons flow with prescribed sequences of *** this paper we propose a constraint-based workflow model for person-centric flows and an event-model which can be used to inform applications about the state of these flows.
We have developed a design-support system which enhances design ideas by activating divergent thinking and convergent thinking of a designer,and offers a natural user interface that does not interrupt the thinking of ...
详细信息
We have developed a design-support system which enhances design ideas by activating divergent thinking and convergent thinking of a designer,and offers a natural user interface that does not interrupt the thinking of a designer using the faculty of a *** system is composed of three user interfaces(UI)—a historical-view UI which analyzes partitions and branches of a design process automatically and displays them in the form of a tree structure,a spatial-view UI with which a designer can freely arrange past sketches in two-dimensional space,and a time-line and partial undo/redo UI which provides free undoing/redoing in units finer than a stroke—based on the results of analysis of a typical design process(i.e.,designing a car), behavior analysis on several designers participating in a drawing experiment,and previous *** effectiveness of this system was confirmed by the results of evaluation experiments with professional designers.
Workflow control performance is a cornerstone of operational excellence in refining and calculating either the human resources or the materials that belong to a sequence of events constituting a *** events in real lif...
详细信息
Workflow control performance is a cornerstone of operational excellence in refining and calculating either the human resources or the materials that belong to a sequence of events constituting a *** events in real life industrial environments and monitoring them through surveillance applications has become mainstream in the refining industry and is changing the maintenance methodology surrounding control assets from predictive to condition *** has made monitoring and diagnosing control and alarming problems *** specific events in a process and raising an alarm for security and safety reasons is the main point of this *** brief we present the general system architecture of our proposed solution and an application that uses surveillance video inputs and raises appropriate alarms in case of normal or abnormal *** paper also presents main issues that have been considered during our research on alarming systems and explains the main problems of applying those in industrial environments.
暂无评论