The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Changes in the network topology such as large-scale power outages or Internet worm attacks are events that may induce routing information updates. Border Gateway Protocol (BGP) is by Autonomous Systems (ASes) to address these changes. Network reachability information, contained in BGP update messages, is stored in the Routing Information Base (RIB). Recent BGP anomaly detection systems employ machine...
Knowledge discovery from the Web is a cyclic process. In this paper we focus on the important part of transforming unstructured information from Web pages into structured relations. Relation extraction systems capture information from natural language text on Web pages, called Web text. However, extraction is quite costly and time consuming. Worse, many Web pages may not contain a textual representation...
Community Question Answering (CQA) has become a popular and effective mean for seeking information on the Web. It is now possible and effective to post a question asked in natural language on a popular community Question Answering (QA) portal, and to rely on other users to provide answers. These online collaborative services are attracting users and questions at an explosive rate, while how to correctly...
The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient compared against the high spreading rate of malware. Hence, automated behavior-based malware detection using machine learning techniques is considered a profound solution. The behavior of each malware on an emulated...
Trustworthy network is an inevitable trend in the development of high trusted computing and Internet. Behavior evaluation is an important research topic in trustworthy network. Till now, most effect focuses on the validity of host's and user's identity, such as integrity measurement and access control, which could not guarantee the trustworthiness of valid user's behavior. In this paper, we proposed...
Due to the prevalence of digital cameras, it is easy to retrieve digital images from the Internet. With the rapid development of digital image processing, databases, and Internet technologies, how to efficiently manage a large amount of digital images is very important. In this paper, we proposed a novel approach for automatic image annotation. We extract color, texture, and shape features from a...
Pornographic image recognition and filtering are of great significance for web security and content monitoring. In this paper, an adult image recognition method based on support vector machine (SVM) and erotic category is proposed. Global color and texture features and local SIFT feature are extracted to train multiple SVM classifiers for different erotic classes. Face detection is used to filter...
This paper describes an efficient way to presort students as possible pass / fail courses in which use of distance education as an aid or fully in its activities. The environment was used moodle and technique of data mining for classification was the SVM (Support Vector Machine). This makes it possible to efficiently classify the chance to be a student flunking a course and then act in a preventative...
The Network Address Translation (NAT) technique resolved the IPv4 address shortage problem effectively. Meanwhile, it brings issues to network management. Unauthorized NAT devices may be a significant security problem. Attackers may conduct malicious activities by using computers hidden behind unauthorized NAT. The remote NAT detect algorithm is proposed based on support vector machine method. Different...
Nowadays, online word-of-mouth has turned to be a very important resource for electronic businesses. How to analyze user generated reviews and to classify them into different sentiment classes is gradually becoming a question that people pay close attention to. In this field, special challenges are associated with the mining of traveler reviews. At present, there is some research on sentiment analysis...
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. We argue that the difference of the goals, manners and results of the interaction behaviors of normal flows and attack flows, which show different characteristics on IP addresses and ports. IAI (IP Address Interaction Feature) algorithm is proposed based on the addresses interaction, abrupt traffic change,...
The explosive Web make it hard to organize and manage Web information automatically. Therefore, online learning method such as incremental learning is gradually become effective instrument in practical applications. From our experiments, traditional incremental learning shows some flaws in the iterative process. To overcome the drawback caused by using only support vector to represent the whole former...
In this paper, we construct and compare several feature extraction approaches in order to find a better solution for classification of Turkish Web documents in the marketing domain. We produce our feature extraction techniques using characteristics of the Turkish language, structures of Web documents and online content in the marketing domain. We form datasets in different feature spaces and we apply...
The increasing numbers of Web pages on the cyber world result to the less effectiveness of document retrieval that matches the need of users. The classification of Web pages is one of the solutions to solve this problem. This paper proposes VAMSVM_WPC model which is a novel voting algorithm for classifying the Web pages, which uses a multi-class SVM method. First, feature is generated from text and...
With the development and widely used of Internet and information technology, the Web has become one of the most important means to obtain information for people. According to the Web document classification and the theory of artificial neural network, a Web classification mining method based on classify support vector machine (SVM) is presented in this paper. The SVM network structure that used for...
Catalog pages construct the intermediate layer in architecture of a standard Web site; therefore research on information retrieval for this kind of pages can be beneficial to improve Web crawler's efficiency. A page is called "catalog-style" if its main body is displayed as a sequence of regular entries, and the central link in each entry apparently contains the pagepsilas major information...
With the popularization of the Internet, it is challenging to develop spam filters that can effectively eliminate the increasing volumes of unwanted mails automatically before they enter a user's mailbox. To efficiently solve the spam filtering problems, a spam mail filtering method based on neighborhood preserving embedding (NPE) and support vector machines (SVM) classifier is proposed in this paper...
This paper presents a new algorithm of Web page classification, CUCS(Combined UC and SVM), for large training set. CUCS combines the advantages of SVM (Support Vector Machine) and UC (Unsupervised Clustering), achieving high precision and fast speed. In the training stage, CUCS gets clustering centers, which include positive example centers and negative ones, by means of UC. Then CUCS prunes training...
With the explosive growth of World Wide Web, it is of great importance to develop methods for the automatic classifying of large collections of documents. To efficiently tackle this problem, a novel document classification algorithm based on locality pursuit projection (LPP) and SVM is proposed in this paper. The high-dimensional document space are first mapped into lower-dimensional space with LPP,...
Port state control (PSC) inspection is the most important mechanism to ensure world marine safe. Recently, some SVM-based risk assessment systems have been presented in the world. They estimate the risk of each candidate ship based on its generic factors and history inspection factors to select high-risk one before conducting on-board PSC inspection. However, how to improve the performance of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.