The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In big data environment, the performance of the focused crawler has a great impact on the results of crawling. In order to improve the efficiency and accuracy of focused crawler, this paper proposed a combination method of HTML analysis and text density and multi-reference factors similarity calculation method based on the basic principle and key technologies of focused crawler. The proposed method...
This paper provides the challenges in the design and investigation of E-commerce and M-commerce systems, besides providing various factors for success. Modeling of e-Commerce is necessary as it measures the success and helps in improving the site to achieve the same. The success of an E-Commerce site depends on different parameters and their relative weightage. Hence a systematic mathematical model...
The basic methods of innerlinking are analyzed in the article and variants of structure construction of Internet resources depending on the types of requests, by means of which the popularization is performed, are provided. The process of calculating the link weight is described and algorithm of weight transfer between pages of Internet resources is developed. Analysis and proper implementtation of...
The actual task of research and development of methods and means for processing data in intellectual information systems forming content with the use of the classification, mathematical and software means and a generalized system architecture. The necessity for development of methods and means of processing data in intelligent information systems forming content by improving system architecture in...
Today almost everyone is using internet for daily activities. Whether it's for social, academic, work or business. But only a few of us are aware that internet generally we access only a small part of the overall of internet access. The Internet or the world wide web is divided into several levels, such as web surfaces, deep web or dark web. Accessing internet into deep or dark web is a dangerous...
Domain names and domain name system (DNS) have been used and abused for over 30 years since the 1980s. Although legitimate Internet users rely on domain names as their indispensable infrastructures for using the Internet, attackers use or abuse them as reliable, instantaneous, and distributed attack infrastructure. However, there is a lack of complete understanding of such domain name abuses and the...
Given a users query, traditional image search systems rank images according to its relevance to a single modality (e.g., image content or surrounding text). Nowadays, an increasing number of images on the Internet are available with associated meta data in rich modalities (e.g., titles, keywords, tags, etc.), which can be exploited for better similarity measure with queries. In this paper, we leverage...
The Internet has dramatically changed the way companies can reach their clients. Henceforth, to develop their business online, companies have to drive qualified traffic to their website. For this, their website must be visible in the first pages of search engine results. Search Engine Optimization (SEO) permits the improvement of the position of a website on the search engines results pages. However,...
In this paper, images generated from pinyin and actual written simplified characters are comprehensively analyzed through Internet and electronic device usage. The study is based on current usage of most frequently used Chinese simplified characters in smart phones, mobile devices and in WWW. Generally a Chinese character carries significant meaning, and evolved over the years through representation...
Various methods have been proposed for creating and maintaining lists of potentially filtered URLs to allow for measurement of ongoing internet censorship around the world. Whilst testing a known resource for evidence of filtering can be relatively simple, given appropriate vantage points, discovering previously unknown filtered web resources remains an open challenge. We present a novel framework...
The background of this paper is the issue of how to overview the knowledge of a given query keyword. Especially, we focus on concerns of those who search for Web pages with a given query keyword. The Web search information needs of a given query keyword is collected through search engine suggests. Given a query keyword, we collect up to around 1,000 suggests, while many of them are redundant. We cluster...
Different from general-purpose search engines, vertical search engine only needs to collect and index only a specific knowledge domain, and then provides more professional search services for users. In this paper, we propose a novel library resource vertical search engine based on ontology technology. In the vertical search engine, the information that crawler collects from Internet should be further...
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN), Interest names introduce novel vulnerabilities that can be exploited. By setting up a malware, Interest names can be used to encode critical information (steganography embedded) and to leak information out of the network by generating anomalous Interest traffic. This security threat...
The rapid development of digital technology and the constantly increasing number of online information sources have meant that students' skills related to information seeking are crucial for academic success. This Paper presents the selected findings of a case study with an emphasis on identifying differences and similarities between international and Croatian students' information seeking skills...
Various malicious methods for a website to get more popularity than it deserves are mainly classed into two types, one of which is link-based spam. Mainstream link-based anti-spam algorithms, including ranking algorithms and spam algorithm only count the number and quality of links of a page to identify a spam page, with some of them using a whitelist or a blacklist. This paper proposed a PageRank-improved...
The primary goal of this research is to explore differences in visual search behaviour, performance and subjective satisfaction between English, Arabic and Chinese speaking users of a Search Engine Result Page (SERP) in order to provide design insights for international web designers and developers. The research uses eye tracking to examine whether differences in visual behaviour and eye movement...
In this paper we investigate a Persian search engine log and present a comprehensive analysis of question queries in three levels: structure, click and topic. By analyzing question queries characteristics, we explore behavior of Persian language users. Our experimental results show that question queries length are larger than normal queries. Most of these queries contained question words "How"...
Traditional endpoint protection will not address the looming cybersecurity crisis because it ignores the source of the problem--the vast online black market buried deep within the Internet.
The increase of the web 2.0 applications and the Spread of mobile devices in the institution of higher education and increasing users lead to slow wireless connection. Moreover, the uses of different web 2.0 application lead to the consumption more bandwidth where the web 2.0 has inspired intense and growing interest, particularly as social networks, search engines, multimedia, markets and news, education,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.