Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud scheduling system, the main purpose of which is to execute jobs optimally, i...
详细信息
In this work, we present and establish a new primitive called Multi-level Controlled Signature. This primitive allows a signer to specify a security level to limit the verifiability of the signature. This primitive wo...
详细信息
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion sys...
详细信息
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion system in wireless local area network by using Support Vector Machines (SVM). The data that are used in our experiments originated from a computer Lab. SVM performs intrusion detection based on recognized attack patterns. Simulation result show that proposed detection system can recognizes anomalies and raises an alarm. In addition, evaluation produced a better result in terms of the detection efficiency and false alarm rate which may give better coverage, and make the detection more effective.
Natural language processing is an emerging technology in linguistic industry and an aid to human-computer interaction in computer science. Language identification, on the other hand, is a form of pattern recognition t...
Natural language processing is an emerging technology in linguistic industry and an aid to human-computer interaction in computer science. Language identification, on the other hand, is a form of pattern recognition that helps to identify predefined language of a web page and to predict the unknown language of one particular text. Written texts are constructed by common features such as character, word and n-gram and these characteristics are unique among languages. From the experiment result, the performance of the supervised n-gram produces an accurate identification value and outperforms the distance measurement on Arabic script web pages.
A multiple probes fusion framework is proposed in order to provide information at the match score level. This experiment tested 112 simultaneous latent fingerprints from IIITD SLF Database. The Gallery of Optical is u...
详细信息
A multiple probes fusion framework is proposed in order to provide information at the match score level. This experiment tested 112 simultaneous latent fingerprints from IIITD SLF Database. The Gallery of Optical is used as references to the accuracy of matching latent fingerprint to optical fingerprint. Experimental results from the IIITD SLF database and optical fingerprint images indicate that the multi probe fusion can be decreased the number of False Reject Rate (FRR) and increased the score matched of simultaneous latent print that contains a multiple ridge impressions.
K-means algorithm is very well-known in large data sets of clustering. This algorithm is popular and more widely used for its easy implementation and fast working. However, it is well known that in the k-means algorit...
详细信息
K-means algorithm is very well-known in large data sets of clustering. This algorithm is popular and more widely used for its easy implementation and fast working. However, it is well known that in the k-means algorithm, the user should specify the number of clusters in advance. In order to improve the performance of the K-means algorithm, various methods have been proposed. In this paper, has been presented an improved parameter less data clustering technique based on maximum distance of data and Lioyd k-means algorithm. The experimental results show that the use of new approach to defining the centroids, the number of iterations has been reduced where the improvement was 60%.
Cloud computing fulfills the long-held dream of computing as a utility and fundamentally altering the expectations for how and when computing, storage and networking resources should be allocate, managed, consume and ...
详细信息
In recent years, there have been increasing interests in using Component-Based System Development (CBSD) approach to develop large and complex applications. It's believed that satisfying quality attributes is an e...
详细信息
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i...
详细信息
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i.e. with minimum average waiting, turnaround and response time. Replication provides improved availability, decreased bandwidth use, increased fault tolerance, and improved scalability. To speed up access, file can be replicated so a user can access a nearby replica. In this paper, we propose architecture to convert Globally One Cloud to Locally Many Clouds. By combining replication and scheduling, this architecture will improve efficiency, accessibility and reliability. In the case of failure of one sub cloud or one cloud service, clients can start using another cloud under "failover" techniques. As a result, no one cloud service will go down.
暂无评论