In this work, we present and establish a new primitive called Multi-level Controlled Signature. This primitive allows a signer to specify a security level to limit the verifiability of the signature. This primitive wo...
详细信息
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion sys...
详细信息
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion system in wireless local area network by using Support Vector Machines (SVM). The data that are used in our experiments originated from a computer Lab. SVM performs intrusion detection based on recognized attack patterns. Simulation result show that proposed detection system can recognizes anomalies and raises an alarm. In addition, evaluation produced a better result in terms of the detection efficiency and false alarm rate which may give better coverage, and make the detection more effective.
K-means algorithm is very well-known in large data sets of clustering. This algorithm is popular and more widely used for its easy implementation and fast working. However, it is well known that in the k-means algorit...
详细信息
K-means algorithm is very well-known in large data sets of clustering. This algorithm is popular and more widely used for its easy implementation and fast working. However, it is well known that in the k-means algorithm, the user should specify the number of clusters in advance. In order to improve the performance of the K-means algorithm, various methods have been proposed. In this paper, has been presented an improved parameter less data clustering technique based on maximum distance of data and Lioyd k-means algorithm. The experimental results show that the use of new approach to defining the centroids, the number of iterations has been reduced where the improvement was 60%.
Mining frequent patterns in a large database is still an important and relevant topic in data mining. Nowadays, FP-Growth is one of the famous and benchmarked algorithms to mine the frequent patterns from FP-Tree data...
详细信息
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i...
详细信息
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i.e. with minimum average waiting, turnaround and response time. Replication provides improved availability, decreased bandwidth use, increased fault tolerance, and improved scalability. To speed up access, file can be replicated so a user can access a nearby replica. In this paper, we propose architecture to convert Globally One Cloud to Locally Many Clouds. By combining replication and scheduling, this architecture will improve efficiency, accessibility and reliability. In the case of failure of one sub cloud or one cloud service, clients can start using another cloud under "failover" techniques. As a result, no one cloud service will go down.
Activity recognition focuses on inferring current user activities by leveraging sensory data available on today's sensor rich environment. Supervised learning has been applied pervasively for activity recognition....
详细信息
Unified Modelling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of U...
详细信息
Unified Modelling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of UML is Sequence Diagram. Sequence Diagrams are capable of modeling interactional behaviours as well as dynamic happenings in a system, and as such are generally used in the modeling of complex softwaresystems. However in this paper, Sequence Diagrams are used in the modeling of the IEEE 802.11 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. The Sequence Diagram representing this protocol will then be used for formal, mathematical analysis by first transforming the Sequence Diagram through the MDA model transformation tool called SD2PN, and performing analysis such as liveness analysis, boundedness analysis and reach ability analysis of the resulting Petri Net.
Dynamic system management may involve interaction between independent decision-making components which can lead to conflicts. Policy-based Managers Coordination (PobMC) was proposed as an adaptive framework that may h...
详细信息
ISBN:
(纸本)9781467308946
Dynamic system management may involve interaction between independent decision-making components which can lead to conflicts. Policy-based Managers Coordination (PobMC) was proposed as an adaptive framework that may handle such conflicts. In PobMC, policies are used to adapt the system behavior, coordinate managers' tasks and allow us to decouple the adaptation concerns from the application code. Thus, it is required to ensure whether the governing policies are enforced correctly. In this paper we check and evaluate the dynamic conflict avoidance algorithm proposed in our previous works. Policy combination algorithms (PACs) concepts are used in the analysis and the evaluation to avoid policy conflicts and to reach a unique decision.
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the disciplin...
详细信息
ISBN:
(纸本)9781450316040
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the discipline;before being learned, they can block a student's progress. In this paper, we propose that in computing, skills, in addition to concepts, can sometimes be thresholds. Some students report finding skills more difficult than concepts. We discuss some computing skills that may be thresholds and compare threshold skills and threshold concepts. Copyright 2012 ACM.
暂无评论