In the present paper the experimental research dedicated to derivation of anhydrite cements with upgraded mechanical, physical properties and water resistance. The mechanism of the influence of technogenic fine-disper...
详细信息
In the present paper the experimental research dedicated to derivation of anhydrite cements with upgraded mechanical, physical properties and water resistance. The mechanism of the influence of technogenic fine-dispersed additives such as burnt galvanic sludges to the structure and properties of anhydrite matrix is discovered. The anhydrite cements were selected and the rational spheres for its application in the building industry were offered.
As the value of gold cannot be blindly rejected, forecasting the future prices of gold has long been an intriguing topic and is extensively studied by researchers from different fields including economics, statistics,...
详细信息
ISBN:
(纸本)9781509029495
As the value of gold cannot be blindly rejected, forecasting the future prices of gold has long been an intriguing topic and is extensively studied by researchers from different fields including economics, statistics, and computer science. The motivation for these studies is naturally to predict the future prices so that gold can be bought and sold at profitable positions and reduce the risk of investment. However, there are still a lot of untackled questions and room for improvements in these forecasting techniques. This is because there are no optimal models for all forecasting problems. Different question needs a different answer; therefore, more experiments and modeling need to be done in order for researcher to enhance their findings. The target of this paper is to present a gold forecasting techniques using one of the optimization algorithm called Grey Wolf Optimizer (GWO).
As a contribution to the specification and verification of critical softwaresystems, this article presents a formal proposal for compositional verification, which uses model checking technique and integrates a modell...
详细信息
We propose an entity tagger for Indonesian tweets sent during labor strike events using supervised learning methods. The aim of the tagger is to extract the date, location and the person/organization involved in the s...
详细信息
Biometric is uses to identify authorized person based on specific physiological or behavioral features. Template protection is a crucial requirement when designing an authentication system, where the template could be...
详细信息
Preference relations are very useful to express decision makers' preferences over alternatives in the process of decision-making. However, multiple self-confidence levels are not considered in existing preference ...
详细信息
Owing to the significance of combinatorial search strategies both for academia and industry, the introduction of new techniques is a fast growing research field these days. These strategies have really taken different...
详细信息
ISBN:
(纸本)9781467384612
Owing to the significance of combinatorial search strategies both for academia and industry, the introduction of new techniques is a fast growing research field these days. These strategies have really taken different forms ranging from simple to complex strategies in order to solve all forms of combinatorial problems. Nonetheless, despite the kind of problem these approaches solve, they are prone to heavy computation with the number of combinations and growing search space dimensions. This paper presents a new approach to speed up the generation and search processes using a combination of stack and hash table data structures. This approach could be put to practice for the combinatorial approaches to speed up the generation of combinations and search process in the search space. Furthermore, this new approach proved its performance in diverse stages better than other known strategies.
Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due ...
详细信息
Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems have proved to be flawless, though various approaches have been used to thwart network intrusion activities. This paper proposes an investigation Model for Identifying and Collecting Intrusion Evidences (MICIE). In particular, the proposed model MICIE comprises three main features, SNORT as IDS, MySQL as database and BASE for result viewing. These features were installed on Raspberry Pi, which was used to aid the data collection process. The results demonstrated that the proposed model is promising for identifying and collecting evidence of network intrusions in real time.
This paper addresses the challenge of identifying clinically-relevant patterns in medical datasets without endangering patient privacy. To this end, we treat medical datasets as black box for both internal and externa...
详细信息
This paper addresses the challenge of identifying clinically-relevant patterns in medical datasets without endangering patient privacy. To this end, we treat medical datasets as black box for both internal and external users of the data enabling a remote query mechanism to construct and execute database queries. The novelty of the approach lies in avoiding the complex data de-identification process which is often used to preserve patient privacy. The implemented toolkit combines softwareengineering technologies such as Java EE and RESTful web services, to allow exchanging medical data in an unidentifiable XML format along with restricting users to the need-to-know privacy principle. Consequently, the technique inhibits retrospective processing of data, such as attacks by an adversary on a medical dataset using advanced computational methods to reveal Protected Health Information (PHI). The approach is validated on an endoscopic reporting application based on openEHR and MST standards. The proposed approach is largely motivated by the issues related to querying datasets by clinical researchers, governmental or non-governmental organizations in monitoring health care services to improve quality of care.
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situ...
详细信息
ISBN:
(纸本)9781509017225
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situation are also in place. The systematic reviews of a well-known methods and approaches shows a significant numbers of researches been done in this area. Based on the number of effort and researches, the quality of services should proportionately increase alongside them. We look this matter from the perspectives of enforcement, that evident the stand of quality of services. Service Level Agreement (SLA) enforcement impact measures is a potential research area to be explored. Assumptions that this study is making are, SLA management will become better by a firm enforcement, where every customers are responsible to launch report of bugs or mischief of services such as unsatisfactory quality or service unavailability to a collection pool, and the provider will react immediately to the complaints so that the total downtime not exceeding the SLA value, with efficient enforcement. This study establishes fundamental theory to measure enforcement impact to SLA monitoring and management. We proposed eight activity phases from formulating until analyzing and decision formation. Descriptive statistics is utilized to analyze the extracted data. The SLA validation detection is the most frequent purpose of SLA monitoring systems in cloud by 58% and throughput is checked as an attribute target by 28%. The self-monitoring SLA, self-healing system, hierarchical structure are recognized points of SLA monitoring systems which need improvement before the enforcement could be based upon.
暂无评论