Global

In the present world scenario network-based computer systems have started to play progressively more vital roles. As a result they have become the main targets of our adversaries. To apply high security against intrusions and attacks, a number of software tools are being currently developed. To solve the problem of intrusion detection a number of pattern recognition and machine learning algorithms has been proposed. The paper states the problem of classifier fusion with soft labels for Intrusion Detection. Performance of Artificial Neural Networks (ANN) and Support Vector Machines (SVM) is presented here. The performance of fusing these classifiers using approaches based on Dempster- Shafer Theory, Average Bayes Combination and Neural Network is proposed. As shown through the experimental results combined classifiers perform better than the individual classifiers.
Long before the word `empowerment’ became popular, women were speaking about gaining control over their lives, and participating in making the decisions that affect them in home and community, in government and international development policies. But problem is, very few have clear conception on empowerment. This is very easy to say but difficult to understand what is empowerment? This article takes an initiative to clarify the concept based on several scholar’s views. And finally, make a conclusion with alternative analysis of women’s empowerment.
The focus of this research is to build a cloud based architecture to analyze the correlation between social media data and events predictions. From analytical point of view this study refurbishes the viability of models that treat public mode and emotion as a unitary phenomenon and suggest the needs to analyze those in predicting the market event status of the respective companies. The major significance of this research is the normalization and the conversion process that has utilized vector array list which thereby strengthen the conversion process and make the cloud storing an easy process. Furthermore, the experimental results demonstrate its improved performance over the factor of emotion analysis and synthesizing in the process of prediction to extract patterns in the way events behave and respond to external stimuli and vice versa.
The analytic hierarchy process (AHP) is a structured technique for dealing with complex decisions that was developed by Thomas L. Saaty in the 1980 year. It provides a comprehensive and rational framework for structuring a decision problem, for representing and quantifying its elements, for relating those elements to overall goals, and for evaluating alternative solutions. The base of this model is comparing variables by pair wise by Matrix relationship. In this way, pair wise of the effective variables on the concrete Pavement were considered and based on relative weights the output was extent.
Today, excess density of population in city and it is increasing growth in bulk is led to demand and attention to urban development. Demand for urban development is one of the most important issues against human in future. Therefore, to solve this problem and obstacles, safety system of city should be developed along this to cover whole city. The most important problem about the services of fire stations is the inappropriate distribution of stations and restricted function area of present stations. So, qualities and quantities distribution of stations is investigated scientifically and professionally. Using traditional methods planning fire stations for services mean wasting papers and time, but today, using GIS serves as a tool to create proper and effective database.
I. Introductionstem cells were first isolated from the internal cell mass of blastocyst and grown in vitro. Variants of these techniques for obtaining and cultivation are used today in laboratories around the world.The most important publications related to stem cells have been centralized in the years 2001 and 2002 by R. Edwards. In vitro growth of the embryo is the subject of many research teams, the first one realizing it was Heope in 1980, which won the doe produced after embryo transfer to recipient. (Gottlieb, D.I. and Huettner, J.E., 1999).Early research on stem cells in vitro cultivation (Fig. 1) were made in 1963 by J. Paul and E. Edwards, who prepared for a group of cells growing rabbit embryo preimplantaţional in drops ofNCTC 109 , 199, F10. (Theia, N.D., 2000). A stem cell has two main properties: long-term capacity autoreînnoire without senescence and pluripotenţă and ability to differentiate into one or more specialized cell types. These cells can provide an inexhaustible source of cells for transplantation. Totipotente stem cells that have the ability to generate all types of tissue plays a critical role in human development, providing material for the development of all tissues and organs in the embryo and in all extra embryonic tissues.At first it was thought that these adult stem cells regenerate only a very limited set of cell lines, but they demonstrated during a much greater plasticity.
Previous research has revealed that teachers’ beliefs play an important role in identifying their professional behavior. Teachers’ beliefs affect their teaching. The exploration of the relationship between teachers’ beliefs, and their classroom practices is the main aim of this study. Teaching and learning in an English language classroom in the context of grammar is the center point of present study. 160 schools from the province of Punjab were selected for survey. Questionnaire is a best tool to explore teachers’ beliefs and their practices. In country like Pakistan where English is being taught as a foreign language it was found that teachers emphasize grammar and widely used method of grammar teaching is deductive. Teaching is an individualized activity and problems faced by teachers while teaching grammar are not discussed collectively. Data analysis involved descriptive statistics, independent t test analysis and ANOVA. Educational implications will also be discussed. It will also open great opportunity to researchers to do further research is this area of study.
Communication is viewed as the major underlying process as well as an outcome of the acculturation process. Intercultural communication takes place when individuals influenced by different cultural communities negotiate shared meanings in interaction. This article concludes with an assessment of communication variables contributing to acculturation among sojourners. Three casual factors: language fluency (LF), acculturation motivation (AM), and interaction potential (IP) were tested in relation to one another against the originally hypothesized assumptions and the path model. In explaining and predicting sojourners communication behaviors simple correlation, multiple regression, and path analysis were employed. It was found in the present study that interaction potential with host society was shown to be the primary causal factor of the three in facilitating intercultural communication.
At the basis of the dynamic elasticity theory with the use of Debye’s potentials are found resonances of elastic spheroidal bodies (prolate and oblate) as entire so and in form of shells. In addition to analytic solutions, computer calculations are performed of moduluses of the angular characteristics of the scattering and sections of the scattering of spheroidal bodies.
We proposed a secured e-voting system model by using blind signature. Our proposed model meets all security requirements which are: (authentication, privacy, integrity, non repetition). Our proposed model depends on these main entities that are involved within the voting processes (voter registration, voting, counting, audit), and these entities are: certificate authority, ministry of interior, voter, high committee of elections (investigator), and counter. The voter can vote from any remote with secured data transfer (ballot) by using the blind signature to blinded ballot and then sign it. When it is sent to the high committee of elections (investigator) for checking the voter eligibility, there is an encrypting random value (r) that is attached with the blind ballot, using for removing blind the ballot which is encrypted by counter’s public key. The high committee of elections checks the signature of voter and checks that if he is an eligible voter or not. Then removes the voter’s digital signature and puts his digital signature and then sends it to the counter party. The counter party checks the signature of high committee of election and extracts the random value (r) by decrypting with his private key and removing the blind ballot and counts the vote.