JNE has a pickup service program to pick up a package of loyal online shop customers. This system still has limitations in terms of interaction with customers and JNE customer service. This causes less than the maximu...
详细信息
Most people in the world have the habit of watching television, sometimes watching television can be a necessity for the community and some people assume that watching television at home can improve their quality of l...
详细信息
One of agricultural cultivation technology development that is worth disseminating is the aquaponic agricultural technique that will be our idea in this writing. With some light, temperature, and humidity manipulation...
详细信息
On-road vehicle detection is a major part of various applications, such as driver assistance systems and auto-driving, and these systems need to detect vehicles robustly and accurately. This paper proposes a robust ve...
详细信息
Since the reusing and arranging of available Web services have been raised, the amount of infrastructure strategies based on Service Oriented architecture (SOA) is increasing. Hence, a rich Semantic Web service descri...
详细信息
Available records show that over 80% of the patient suffering from diabetes die from heart or blood diseases. Total cure for the diabetes is currently not available. In this paper, we proposed diabetes classifier base...
详细信息
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe ch...
详细信息
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computersystem and then use this information to secure the network. In this context, signature-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities. Signature-based detection is the most extensively used threat detection technique for (IDSs). One of the foremost challenges for signature-based IDSs is how to keep up with large volume of incoming traffic when each packet needs to be compared with every signature in the database. When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential attacks. This paper proposes a new model called Signature-based Multi-Layer IDS using mobile agents, which can detect imminent threats with extremely high success rate by dynamically and automatically creating and using small and efficient multiple databases, and at the same time, provide mechanism to update these small signature databases at regular intervals using mobile agents.
The femtocell network allows connecting to cellular network through broadband connection. In femtocell, time with network synchronization becomes a critical issue at present. Synchronization is a process which is requ...
详细信息
The Enterprise Resource Planning system is a huge and complex informationsystem that enables the whole organization to operate, collaborate and coordinate its activities through the use of a single data repository. I...
详细信息
Air pollution is one of the environmental problems faced by many countries (i.n. the developing countries). It often harms the health of people, plants, and animals as well as our environment. To decrease the risks, e...
详细信息
暂无评论