For researches in the field of the data mining and machine learning the necessary condition is an availability of various input data set. Now researchers create the databases Continue reading
Get Latest Final Year Computer Projects in your Email
Tag: Modeling
Chinese input with Keyboard and Eye-tracking
Chinese input presents unique challenges to the field of human computer interaction. This study provides an anatomical analysis of today’s standard Chinese input process, which is based on Continue reading
Design and Implementation of an Environment to Support Development of Methods for Security Assessment
There is no debate over the importance of IT security. Equally important is the research on security assessment; methods for evaluating the security of IT systems. The Swedish Defense Research Agency has for Continue reading
Modeling the Worm and Detection of the Camouflaging Worm
Active worms major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise Continue reading
Developing a new 2D-Plotting Package for OpenModelica
OpenModelica is an open-source based development environment for Modelica, and an open source modelling and Continue reading
Modelling and Simulation of Unknown Factors in Simulation Based Acquisition
When a new product should be acquired, a model over its functionality is made. A quite new idea in the military area is to use simulations to find out Continue reading
Modeling and Detection of Camouflaging Worm using IP Traceback
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their Continue reading
Distributed Case Based Reasoning for Intelligent Tutoring System: An Agent Based Student Modeling Paradigm
(ITS) is becoming very popular where the system models the student’s learning behavior and presents to the student the learning material (content, questions-answers, assignments) accordingly. In today’s distributed computing environment, the tutoring system can Continue reading
Modeling and Detection of Camouflaging Worm
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to Continue reading
Modelling and Detection of Camouflaging Worms – A Survey
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer network. Active worm’s is also one type of worm which causes Continue reading