Since dawn of the World Wide Web, the retrieval of relevant information has been a major problem for search engines. Current Web search engines use search algorithms to generate results that are suitable for discoveri...
详细信息
Knowledge is the most important strategic tool for improving and maintaining organizational performance. Knowledge has become the essential part of every successful organization. This makes the organizations to put mo...
详细信息
This paper explores the entity relationship diagram, a popular conceptual model used to depict entities, attributes, and relationships graphically. To help with this, we use ChatGPT, a sophisticated language model bas...
详细信息
Diversification of the utilization of orchids is now more widespread with the increasing variety of products that can be accepted by the market so that it becomes a business opportunity. Indonesia has a wealth of high...
详细信息
Propagation of wireless technologies, mobile computing devices, and the Internet has provided an opportunity to develop and deliver new types of location-based applications and services to users. This paper presents a...
详细信息
作者:
Selamat, AliLim, Pei-Geok
Department of Software Engineering Faculty of Computer Science and Information System Malaysia
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed a...
详细信息
ISBN:
(纸本)9781424438853
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed as an efficient image retrieval tool, whereby the user can provide their query to the system to allow it to retrieve the user's desired image from the image database. However, the traditional relevance feedback of CBIR has some limitations that will decrease the performance of the CBIR system, such as the imbalance of training-set problem, classification problem, limited information from user problem, and insufficient training-set problem. Therefore, in this study, we proposed an enhanced relevance-feedback method to support the user query based on the representative image selection and weight ranking of the images retrieved. The support vector machine (SVM) has been used to support the learning process to reduce the semantic gap between the user and the CBIR system. From these experiments, the proposed learning method has enabled users to improve their search results based on the performance of CBIR system. In addition, the experiments also proved that by solving the imbalance training set issue, the performance of CBIR could be improved.
In the last few days home automation is one of the biggest developments that technology has achieved today. Nowadays there are many products that control automatically, or by using remote control, or by voice commands...
详细信息
There are two main approaches for implementing IDS;host based and network based. While the former is implemented in the form of software deployed on a host, the latter, usually is built as a hardware product with its ...
详细信息
In this new information era,the transfer of data and information has become a very important *** data must be kept secured from unauthorized persons using *** science of cryptography depends not only on complex mathem...
详细信息
In this new information era,the transfer of data and information has become a very important *** data must be kept secured from unauthorized persons using *** science of cryptography depends not only on complex mathematical models but also on encryption *** acid encryption is a promising model for data *** this paper,we propose an amino acid encryption model with two encryption *** first key is generated randomly using the genetic *** second key is called the protein key which is generated from converting DNA to a protein ***,the protein message and the first key are used in the modified Playfair matrix to generate the cypher *** experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only *** addition,the proposed model has been tested over different types of characters including white spaces and special characters,as all the data is encoded to 8-bit *** performance of the proposed model is compared with other models using encryption time and decryption *** model also balances all three principles in the CIA triad.
Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. A...
详细信息
暂无评论