Learn More
Augmented Reality (AR) is the technology of adding virtual objects to the real scenes through enabling the addition of missing information at real life. As the lack of resources is a problem that can be solved through AR, this paper represents and explains the usage of AR technology in what can be named Augmented Reality Student Card (ARSC) for serving the(More)
Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural(More)
Information and communication technology (ICT) is playing an ever-increasing role in the services provided by academic institutions of today. With the rapid advent in technology and the breadth of tools made available, academic institutions are finding it more challenging to quantify their needs and optimize their ICT investments. Moreover, the pressing(More)
  • Ajit A Muzumdar, Sandip A. Shivarkar, +12 authors Tom V. Mathew
  • 2013
Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. Today most of the intrusion detection approaches focused on the issues of feature selection or reduction, since some of the features are irrelevant and redundant which results lengthy detection process and(More)
  • 1