Information security and computer ethics are one of the foremost integration of current computer scientist in cyber ***,at the same time computer technology may raise some unethical issues with current life style and ...
详细信息
Information security and computer ethics are one of the foremost integration of current computer scientist in cyber ***,at the same time computer technology may raise some unethical issues with current life style and *** the general public becomes increasingly computer literate,the gap between technology and peoples' mental power notably shrinks and this gap fulfillment may not be possible unless by educating the students from the basic level of certain ethical *** the other hand,understanding the factors that influence user acceptance of information technology is vital for further development of any technology and smart card technology as *** the customers ethical and intentional behavior to use information technology should be the key element in the decision-making *** purpose of this study is to develop a model for smart card acceptance from ethical ***,a new method of real time scenario is introduced to identify personal understanding of ethical circumstances by using smart cards.
The biggest challenge facing free space optical deployment is optical signal propagation in different atmospheric conditions such as fog, low clouds, rain, snow, dust, haze and various combinations of each. A transmis...
详细信息
In this paper we present an intrusion detection engine comprised of two main elements;firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information...
详细信息
In this paper we present an intrusion detection engine comprised of two main elements;firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information that must be exchanged between nodes. In particular, we exploit information visualization and machine learning techniques in order to achieve efficient and effective intrusion detection. In order to avoid possible modification or alteration of the maps produced by the intrusion detection engine, we focus on safeguarding and authenticating them using a novel embedded watermarking method. Previously, we had shown promising results in the intrusion detection task using this system. This paper focuses on the watermarking technique and gives a detailed exposition that includes an experimental evaluation of its quality.
Data mining algorithms have been proved to be useful for the processing of large data sets in order to extract relevant information and knowledge. Such algorithms are also important for analyzing data collected from t...
详细信息
Data mining algorithms have been proved to be useful for the processing of large data sets in order to extract relevant information and knowledge. Such algorithms are also important for analyzing data collected from the users' activity users. One family of such data analysis is that of mining of log files of online applications that register the actions of online users during long periods of time. A relevant objective in this case is to study the behavior of online users and feedback the design processes of online applications to provide better usability and adaption to users' preferences. The context of this work is that of a virtual campus in which thousands of students and tutors carry out the learning and teaching activity using online applications. The information stored in log files of virtual campuses tend to be large, complex and heterogeneous in nature. Hence, their mining requires both efficient and intelligent processing and analysis of user interaction data during long-term learning activities. In this paper, we present a bi-clustering algorithm for processing large log data sets from the online daily activity of students in a real virtual campus. Our approach is useful to extract relevant knowledge about user activity such as navigation patterns, activities performed as well as to study time parameters related to such activities. The extracted information can be useful not only to students and tutors to stimulate and improve their experience when interacting with the system but also to the designers and developers of the virtual campus in order to better support the online teaching and learning.
作者:
Selamat, AliLim, Pei-Geok
Department of Software Engineering Faculty of Computer Science and Information System Malaysia
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed a...
详细信息
ISBN:
(纸本)9781424438853
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed as an efficient image retrieval tool, whereby the user can provide their query to the system to allow it to retrieve the user's desired image from the image database. However, the traditional relevance feedback of CBIR has some limitations that will decrease the performance of the CBIR system, such as the imbalance of training-set problem, classification problem, limited information from user problem, and insufficient training-set problem. Therefore, in this study, we proposed an enhanced relevance-feedback method to support the user query based on the representative image selection and weight ranking of the images retrieved. The support vector machine (SVM) has been used to support the learning process to reduce the semantic gap between the user and the CBIR system. From these experiments, the proposed learning method has enabled users to improve their search results based on the performance of CBIR system. In addition, the experiments also proved that by solving the imbalance training set issue, the performance of CBIR could be improved.
It is a common belief among researchers of the Intelligent Transportation systems (ITS) community that ITS applications are the key to make transportation systems safer, more comfortable, and more efficient, while red...
详细信息
The rapidly aging society in Japan has resulted in an increased demand for electric wheelchairs to enhance the mobility of elderly persons. However, the increased use of electric wheelchairs means an increase in the n...
详细信息
This paper describes a control strategy for stable walking by a robot with six legs. While walking, the robot always has three legs in contact with the ground. Walking motion is controlled so that the center of gravit...
详细信息
The educational material which can be used under various situations has multiple variants even for one lecture theme. The lecturer often constructs and manages the variants separately with ad hoc reuse. This scheme of...
详细信息
ISBN:
(纸本)9789868473539
The educational material which can be used under various situations has multiple variants even for one lecture theme. The lecturer often constructs and manages the variants separately with ad hoc reuse. This scheme of reuse raises a problem of consistency among multiple variants. To resolve this problem, we introduce concept of software product line engineering into educational material management. Separation of common parts and variable parts in the educational material enable generation of variants depending on reuse scene. We design and implement a generation tool to evaluate the scheme.
暂无评论