The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Domain generation algorithms (DGAs) automatically generate large numbers of domain names in DNS domain fluxing for the purpose of command-and-control (C&C) communication. DGAs are immune to static prevention methods like blacklisting and sinkholing. Detection of DGAs in a live stream of queries in a DNS server is referred to as inline detection. Most of the previous approaches in the literature...
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
The Open University of Japan (OUJ) and National Institute of Informatics (NII) have started collaborative study for learning analytics. OUJ is the largest distance education institution in Japan. In the academic year of 2015, OUJ launched interactive online courses. One of the essential features of online courses is the possibility to collect and analyze educational big data. To utilize such educational...
In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with...
Indoor positioning is a hot topic in current research. Most of the existing indoor positioning technologies based on time-difference-of-arrival (TDOA) require the time synchronization between base stations. In this paper, a high-precision multiple-antenna indoor positioning system based on chirp signal is proposed, in which each base station extracts TDOA information independently, so there is no...
Continuous Integration (CI) and Continuous Delivery (CD) are widespread in both industrial and open-source software (OSS) projects. Recent research characterized build failures in CI and identified factors potentially correlated to them. However, most observations and findings of previous work are exclusively based on OSS projects or data from a single industrial organization. This paper provides...
Since computing infrastructure has intrinsically a redundant logic, budget saving practices or understaffing of IT departments lead to an “emergency room” service paradigm. However, a treasure of information that could facilitate preemptive maintenance is buried in the logs and messages that are automatically generated by regular processes. Such information is typically ignored because of the shear...
The concept of agile domain name system (DNS) refers to dynamic and rapidly changing mappings between domain names and their Internet protocol (IP) addresses. This empirical paper evaluates the bias from this kind of agility for DNS-based graph theoretical data mining applications. By building on two conventional metrics for observing malicious DNS agility, the agility bias is observed by comparing...
Through the continuous collection and in-depth analysis of the quality monitoring data of colleges and universities, we combine the efficiency processing of big data and data evaluation, monitor the status of higher education normally, and construct a higher education quality monitoring and evaluation platform based on Spark. This platform is teaching centered with schools as its basis, including...
The system from the point of view, follows the principles of the software engineering of. Net framework and ASP web design technology, data mining technology, the XML data description and manipulation techniques in legal business training system application, using the prototype method and object-oriented system analysis method, a comprehensive analysis of the legal practice teaching business functional...
Different information visualization techniques can be found in the literature due to the quantity and variety of data stored in computational systems. In this context, the classification of chart images becomes important because it allows various types of graphs to be detected automatically in different contexts, allowing a more specific processing for each type of visualization, for example, data...
Cloud computing is taking the technology world by storm because of the varieties of services offered by the cloud service providers (CSPs). Despite numerous benefits offered by CSPs, there are some security issues that may dissuade users from using it. In this service, different virtual machines (VMs) share the same physical resources, these VMs are known as co-resident VMs. The shared physical resources...
The increasing complexity of IT environments dictates the usage of intelligent automation driven by cognitive technologies, aiming at providing higher quality and more complex services. Inspired by cognitive computing, an integrated framework is proposed for a problem resolution. In order to improve the efficiency of the problem resolution process, it is crucial to formalize problem records and discover...
Operation services are reusable and shareable units of configuration code executed by configuration management tools (CMTs), achieving continuous deployment and continuous delivery. With the prevalence of DevOps (Development and Operations), thousands of operation services have been developed for various software systems, and they are publicly available through the online repositories of popular CMTs...
Fuzzy extractor provides key generation from biometrics and other noisy data. The generated key is seamlessly usable for any cryptographic applications because its information entropy is sufficient for security. Biometric authentication offers natural and passwordless user authentication in various systems where fuzzy extractors can be used for biometric information security. Typically, a biometric...
Hajj is defined as a yearly Islamic pilgrimage to the holy place, Makkah. It is a religious obligation for Muslims who are financially and physically capable to perform. Hajj is one of the five pillars of Islam. The gathering of people during Hajj can be considered as the largest yearly gathering in the world. Every year, thousands of Muslims from all over the world will gather at the holy place during...
Mobile advertisements are critical for both mobile users and businesses as people spend more time on mobile devices than on PCs. However, how to send relevant advertisements and avoid unnecessary ones to specific mobile users is always a challenge. For example, a concert-goer may like to visit restaurants or parks before the concert and may not like the advertisements of grocery stores or farmers'...
Anomaly detection is the process of finding outlying records from a given data set. The aim of this paper is to study a well-known anomaly detection technique on the “Short Message Service Centre” server, used in the telecommunications field to handle and store messages. This server was studied in details, a script was written to gather all the required data that went through a cleaning phase and...
Program dependency artifacts such as call graphs help support a number of software engineering tasks such as software mining, program understanding, debugging, feature location, software maintenance and evolution. Java Enterprise Edition (JEE) applications represent a significant part of the recent legacy applications, and we are interested in modernizing them. This modernization involves, among other...
Software developers use continuous integration to find defects in the early stage and reduce risk. But this process can be resource and time consuming, which decreases the efficiency of development. In this work, we adopt cascaded classifiers to predict the build outcome and study what kinds of attributes are potentially useful for this process. We emphasize on the "failed" instances which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.