The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust plays an important role in helping social network user make appropriate decision from abundant social information about products. A variety of social review information (e.g. ratings, voting and tags) emerge with the huge number of products on the Web. How they are utilized for searching and finding appropriate item is investigated. In this paper we propose a user credibility calculation method,...
Mathematical Models Database (MMD) is an online repository of mathematical models that can be easily used for research purposes, in teaching or in performing comparative tests. In a single free-of-charge, freely accessible Internet service all the data from the database is available with an expected (in its final form) several ready-to-use models, either purely mathematical or physics-based. Apart...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
In the past (classical supply chain) the supply of goods generally flow starts from factory or producer, then producer sent to a storage area called the warehouse. When finished goods are collected, the goods from storage area or warehouse (WH) is distributed to the distribution center (DC). Then after the goods were placed in the Distribution center, then the goods are shipped to the retailer (retailer)...
The article presents analysis of the Internet topology graph model. We use usual methods to analyse properties of the model but also propose some new characteristics. Our experimental data set comprises long-term traceroute records for several thousands of target hosts, repeatedly executed from a fixed source. We processed particular routes by merging them all together thus creating a single connected...
Formal concept analysis is a mathematics research field introduced in the beginning of the 1980s by Rudolf Wille, that has been applied in several different knowledge areas, including Computer Science. FCA is a data analysis theory that identifies conceptual structures within data sets or formal contexts. In this work, we propose an FCA-based approach to build minimal implication rules-based computational...
This paper proposes a new objective metric called the SEMCON to enrich existing concepts in domain ontologies for describing and organizing multimedia documents. The SEMCON model exploits the document contextually and semantically. The preprocessing module collects a document and partitions that into several passages. Then a morpho-syntatic analysis is performed on the partitioned passages and a list...
The Domain Name System (DNS) is an essential component of the Internet infrastructure that translates domain names into IP addresses. Recent incidents verify the enormous damage of malicious activities utilizing DNS. Therefore, detecting malicious domains using the DNS network structure is an important challenge. We take the famous colloquial expression Tell me who your friends are and I will tell...
Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The...
This paper examines the needs of emerging applications of High Performance Computing by the Humanities, Arts, and Social Sciences (HASS) disciplines and presents a vision for how the current academic HPC environment could be adapted to better serve this new class of “big data” research.
The mechanism of SQL injection attack is introduced in this paper. Differing from the works of the predecessors, the authors categorize the injection attacks according to the characteristics of the injection codes. For the type of web databases with SQL Server as the backend, a DDL (Detection-Defense-Log) Model against SQL injection is created. Both the client computer and the server are included...
Web sites are often a mixture of static sites and programs that integrate relational databases as a back-end. As they evolve to meet ever-changing user needs, new versions of programs, interactions and functionalities may be added and existing ones may be removed or modified. Web sites require configuration and programming attention to assure security, confidentiality, and trust of the published information...
The credit rating system for bank customers is based on J2EE technology architecture, is designed from the data sources, customers rating, approval rating and safety management and other aspects. In the paper, we describes the construction of bank customers in the background of credit rating system which is discussed in detail the application of Client/Web server/Application server/Database server...
Discovering the correct dataset efficiently is critical for computations and effective simulations in scientific experiments. In contrast to searching web documents over the Internet, massive binary datasets are difficult to browse or search. Users must select a reliable data publisher from the large collection of data services available over the Internet. Once a publisher is selected, the user must...
As knowledge and rules are hided in e-commerce data, how to mine them is not achieved well in the present e-commerce. IEC (Intelligent E-commerce) is proposed as the next period e-commerce and main feature is to mine e-commerce knowledge and rules from e-commerce data. An Extended K-Means algorithm is proposed to analyze customers' consumptions in the IEC and results indicate that the performance...
Focusing on the development of virtual reality technology and the disadvantage of fixing computer, such as expensive and easy to wear and tear,the project which consists of dynamic web, database and virtual reality is being proposed; furthermore, based on B/S model, computer virtual fixing system will be designed to be available, extensible, and easy to be updated and maintained.
Coal water mixture is a new kind of fluid fuel, and the production of coal water mixture with automatic control is needed for its unique property. This paper focuses on design automatic control to the production of coal water mixture, and present some design schemes. It includes how to design coal water mixture with automatic control system. In addition, it introduces main blocks of coal water mixture...
CVSS (Common Vulnerability Scoring System) is a framework scoring IT vulnerabilities. CVSS is composed of three metric groups: Base, Temporal, and Environmental. Although, the environmental score which gives risk of vulnerabilities in network environment of each user should be used for prioritizing actions, only base score is currently used. One of the reason for unused of environmental score is hard...
Cloud Computing is evolving from a mere “storage” technology to a new vehicle for Business Information Systems (BIS) to manage, organize and provide added-value strategies to current business models. However, the underlying infrastructure for Software-as-a-Service (SaaS) to become a new platform for trading partners and transactions must rely on intelligent, flexible, context-aware Multi-Tenant Architectures...
Cloud computing has received significant attention recently. This paper presents real-time issues related to cloud computing, such as multi-tenancy architecture, scheduling, paralleled computing and proposes a framework for real-time service-oriented cloud computing. Specially, we propose a novel real time architecture which solve the new challenges in Cloud Computing.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.