The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we investigate a Persian search engine log and present a comprehensive analysis of question queries in three levels: structure, click and topic. By analyzing question queries characteristics, we explore behavior of Persian language users. Our experimental results show that question queries length are larger than normal queries. Most of these queries contained question words "How"...
Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user's behavior etc. There are several types of attacks...
The K-12 learning space is evolving in both the United States and internationally. Students are given increasingly frequent access to the internet through various platforms such as desktop computers, laptops, tablets, and other mobile devices. Some schools are distributing mobile devices to students in order to facilitate the integration of technology in the classroom. These devices have a web filter...
The orientation is occupying an increasingly important role in the process of determining the future of the students, which leads to the obligation to make it automatic and accessible, both in terms of immediate accessibility throughout the world or in the offering of several languages that correspond to the language used by the majority of students or persons in need of guidance. These problems can...
Many computer users lack awareness of the connections their computers make to hosts on the Internet. Some realtime tools exist for host-based network monitoring, but they are too complex for average computer users as they require expert knowledge to use and interpret. Connection Cartographer is a tool to let non-expert users visualize geographical information about their network connections in real...
Today internet has become easily accessible which allows the user to perform multiple tasks such as access information, do study, make friends, online shopping, search for anything they want and many more. Similarly people do use internet to know the better options and find out relevant alternatives of product, services, places like wise. But searching for better choices may become frustrating and...
The user enters any query to find desired information. To discover number of user search goals and representing each goal with some keyword, we first infer user search goals for a query by clustering feedback sessions. For that, we use a concept of pseudo document, which is the revised version of feedback session. Then the user search goals are determined by clustering the pseudo documents and it...
There is huge growth of online text documents in the Internet today. We can easily find documents written in languages from all over part of the just from a single click. Increasing number of online text document in Internet makes the increased availability of information on the Internet. In fact that none in the world can understand all languages of the digital documents. Hence, there is a significant...
The traditional mobile application development difficult, costly, cumber some management and other issues, the paper based on computing technology, combined with the Android platform presented in English applied language and computer linguistics online translation system design, improved the traditional English applied language application development for computer linguistics unified based on CCS...
Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The...
Secure delivery of secret data on the Internet is an important research topic in digital communications. Data encryption and steganography are two common techniques used for sending secret data over a public computer network. Steganography utilizes a digital medium as a cover in the delivery of secret data. For medical and military image applications, reversibility is an important requirement in data...
The massive amount of data transfer over internet raises different challenges such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide the data inside document files, where four symbols are used to embed the data inside the carrier file. The main process depends on a key to produce a symbol table and match the data to be hidden with the...
The prevalent use of computer applications and communication technologies has rising the numbers of network intrusion attempts. These malicious attempts including hacking, botnets and works are pushing organization networks to a risky atmosphere where the intruder tries to compromise the confidentiality, integrity and availability of resources. In order to detect these malicious activities, Intrusion...
There are many applications that are incorporating a human appearance and intending to simulate human dialog, but in most of the cases the knowledge of the conversational bot is stored in a database created by a human experts. However, very few researches have investigated the idea of creating a chat-bot with an artificial character and personality starting from web pages or plain text about a certain...
The web viral marketing is rapidly becoming an important marketing strategy in the field of E-Business, and the core groups play an important role in the Web viral marketing. For mining the core groups in the customer groups reasonably and effectively, the principles and methods to build Network-Influence Set of node on the basis of Web Customer Trust Network and an algorithm called BUNES (Building...
With the advances in computer technology, many systems have been developed for educational and instructional purposes. In particular, a computer-based system is very attractive in sports instruction and training as compared to the traditional human coaching approach, saving time, space, and cost. Among several important technical issues to be resolved in such sports instructional systems, motion or...
During the last decade e-learning has become a widely accepted and commonly used educational tool. The main aim of our paper was to compare students' attitudes towards e-learning in Croatia and Scotland, and also to identify two relatively homogeneous groups of students according to their perceptions. T-tests and cluster analysis, in a data mining context, were used in this study and results confirm...
Communication through web is becoming increasingly popular thanks to wireless and cellular networks. As this awareness spreads far and wide in different countries, significant complexities arise in terms of language and communication means for extracting information on the web. This is particularly true in India where more than fifteen officially recognized language texts and more variations in local...
With the high development of Internet, e-commerce websites now routinely have to work with log datasets which are up to a few terabytes in size. How to remove messy data timely with low cost and find out useful information is a problem we have to face. The mining process involves several steps from pre-processing the raw data to establishing the final models. In this paper we describe our method to...
The terrorism activities are not only in real world as development of technology, but also in cyber world. Terrorism activities in cyber world are called cyber terrorism. One of methodology for cyber terrorism detection is by applying data mining algorithm to textual content of terrorism related web pages. Web mining is technology applied to extract information from the web. By using web mining, cyber...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.