The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since computing infrastructure has intrinsically a redundant logic, budget saving practices or understaffing of IT departments lead to an “emergency room” service paradigm. However, a treasure of information that could facilitate preemptive maintenance is buried in the logs and messages that are automatically generated by regular processes. Such information is typically ignored because of the shear...
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since...
NewsOne is a dedicated platform that aggregates all the latest news updates from multiple national and international resources and summarizes them to present in a short and crisp words. This online platform provides a service oriented interaction among the users from across web. The main motto of this application is to access the news fast. It will bring news directly without wasting any time for...
Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user's behavior etc. There are several types of attacks...
Undoubtedly, Cloud computing is the ongoing trend that robbed the widespread concern. In fact, it succeeded in discharging users from computational and storage burden to offer them as services following pay-as-you-go principle. The substantial feature of Cloud is the ability to scale up with the rise of users' demands. However, Cloud performance falls into the duty of scaling up to fulfill the user...
Recently Lu et al. proposed a modified anonymous two-factor authenticated key exchange protocol to eliminate the security weaknesses of Xie et al.'s scheme. They hence claimed that their scheme is immune to possible well-known attacks. However, we found that Lu et al.'s protocol is still insecure against the outsider attack, user impersonation attack, and off-line password guessing attack. To overcome...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
With the phenomenal increase in digital data, it is inefficient to run the traditional clustering algorithms on separate servers. To deal with this problem, researchers are migrating to distribute environment to implement the traditional clustering algorithms, more specifically K-means clustering. In traditional K Means Clustering, the problem of instability caused by the random initial centers exists...
Social Network Analysis (SNA) is a field of study that focuses on analyzing user profiles and participations on social network channels in order to model relationships between people and to predict certain behaviors or knowledge. To achieve their goals, researchers, interested in SNA, have to extract content and structure from the numerous social networks available today. Existing tools, which help...
In our current society, the threat of cyber intrusion is increasingly high and harmful. With the rise of usage in computers, criminal activity has also shifted from physical intrusion into cyber intrusion. Intrusion detection systems provide the ability to identify security breaches in a system. A security breach will be any action the owner of the system deems unauthorized. Current methods used for...
The current Analytics tools and models that are available in the market are very costly, unable to handle Big Data and less secure. The traditional Analytics systems takes a long time to come up with results, so it is not beneficial to use for Real Time Analytics. So, the proposed work resolves all these problems by combining the Apache Open Source platform which solves the issues of Real Time Analytics...
Web log mining is the most important method in Web data mining, and data preprocessing is the primary work. In order to find more value access mode and reduce the data size from the Web, find the data of users and even between users, this paper puts forward a method of Web log data preprocessing based on user characteristic of interests, and then put forward some concepts such as user interest, user...
Electronic Commerce has become extremely popular with the rise in wireless technologies and other communication techniques. Purchasing and shopping at big malls is becoming daily activity in metro cities. There is a huge rush in such places during weekends and holidays. People purchase different items and put them in trolley. After completion of purchases, one needs to go to billing counter for payments...
World Wide Web is today the most important media for collecting, sharing and distributing information. Education is one of the fields where web-based technology has been quickly and successfully adopted. Web mining is active research area which involves transformation and interpretation of web data to find out the hidden information by using various data mining techniques which will be useful in enhancing...
Producing reliable, integrated systems is becoming extremely difficult due to the increasing variability and uncertainty inherent in advancing fabrication technologies; the worsening effects of various wear-out mechanisms; and environmental disturbances (e.g., soft errors due to radiation). Solutions to this problem centering on traditional approaches involving redundant resources are likely to be...
Aiming at the lack of SQL Server skill assessment system at present, in this paper a model of automatic marking on SQL Server skill operation based on XML is proposed after analyzing the existing logically formalized automatic marking technology. And the implementation principles and processes are introduced with focuses on two critical technical links: XML formalized expression and XML formalized...
This paper analyzes the status of the computer lab and traditional management of several problems, made use of its software and manage the development of secondary development of access control systems and remote video monitoring systems to automate the management of design. Realization of the system mainly uses the middleware technology, pattern recognition, data mining technology to solve the organic...
Mining maximal frequent itemsets is to find maximal subsets that appear frequently in datasets, there were many algorithms to effectively solve MFI. Ant colony optimization (ACO) is a new method to solve MFI. However, there are two bottlenecks in which the ACO algorithm takes too much time and solves imprecisely for MFI. A dynamic ACO algorithm with Max-Min Ant System and association graph is proposed...
Female students are in minority in most of technical institutions in India and many infrastructural facilities and services are not targeted to them. Even though Internet facilitates removal of geographical, social and cultural barriers, it does not seem to have any significant impact on academic pursuit of female students. Not many serious investigations have been conducted to study the usage pattern...
The performance of non-preemptive M/M/l queuing system with two priority is newly proposed. Though this kind of queuing system is researched by many scholars, the performance indexes are often approximate. The complementary variable method is also used to make vector Markov process and analyze the state-change equations of the queuing system. With Rouche theorem to analyze the coefficient of the generating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.