The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper identifies the scope of improvement for the search result of a web site. The study includes some commonly used clustering algorithms to identify the usage of clustering approach for improving web elements analysis, in various ways. As the Search result option is extensively used at almost every web site, the main focus is to optimize search result of a web site using clustering approach...
User behaviour analysis based on traffic log in wireless networks can be beneficial to many fields in real life: not only for commercial purposes, but also for improving network service quality and social management. We cluster users into groups marked by the most frequently visited websites to find their preferences. In this paper, we propose a user behaviour model based on Topic Model from document...
With the rapid growth of hierarchical data in public opinion analysis, users are in urgent need of information visualization techniques to present the data in an intuitive way in order to reveal the characteristics of the data, understand the rules behind the data, and then assist them in decision-making process. This research makes improvement in the display insufficiency of leaf nodes in the radial...
The aim of this paper was to propose a classification system composed of monolingual classifiers and a multilingual decision module, for handling large numbers of multilingual documents. The system was compared with two monolingual classifiers, respectively for English and Polish, and with the maximum probability model. The tests were carried out over multilingual documents that contained components...
With the rapid development of Internet, web information is being more and more colorful. However, mixed color information makes people with low vision see webpage unclearly when they surf the Internet. For people with low vision cannot distinguish so many colors, enhancing the contrast between text or image and background is considered as the most effective way to improve this situation. Based on...
This paper proposed an automatic clustering algorithm based on entropy for discovering the interest pattern over users' web log. We introduced the information entropy on the basis of clustering algorithm. Compared with traditional clustering algorithms, our method does not require any parameters specified by the end user. Meanwhile, it can discover the clusters in arbitrary shape and size. Experimental...
The development of the intelligent system for searching for plagiarism by combining two algorithms of searching fuzzy duplicate is considered in this article. This combining contributed to the high computational efficiency. Another advantage of the algorithm is its high efficiency when small-sized documents are compared. The practical use of the algorithm makes it possible to improve the quality of...
Understanding the videos' popularity evolution in social media is important to service providers, video uploaders and viewers. Such understanding can not only drive the improvement of load balancing in the network, but also can be helpful in advertising and discovering new business opportunities. While concentrating on the evolution of video's cumulative number of views after uploading, by modifying...
In this paper, we analyze both BMH algorithm and QS algorithm, focus on the improvement of QS, and present FQS algorithm which can apply to HTTP data reduction. For building this algorithm, we considered character features of pattern strings in HTTP application data, improved the collating sequence of characters in matching process, and had the bad characters jumping strategy improved for increasing...
Having the knowledge of application and version of nodes on the Internet is very important for warning about and managing vulnerabilities. And designing a search engine for the application and version of the nodes is of great importance for the Internet safe guard. In order to meet the users' needs of searching the information of IP address and domain name, the paper proposed a method to convert IP...
With the development of Web technology and more kinds of information, how to provide high quality, relevant search results become a huge challenge to the current Web search engines. We analyze the shortcomings of PageRank algorithm and Weighted PageRank algorithms and make targeted improvements. By judging the relation between different web pages based on web content, the improved PageRank algorithm...
This paper develops a technique to gather and analyze username and password stored in a physical memory or RAM (Random Access Memory). A live memory forensic investigator is able to use this work in order to find the pattern as the “Searching Criteria” for extending the search to other artifacts. The proposed technique uses a quick search algorithm to find the data in the physical memory. By using...
Nowadays the plagiarism constitutes a complex problem, due several factors as the incorrect use of new technologies to access and share the information, the different forms and areas where can be present plagiarism (texts, code, images, self-plagiarism, etc.) or the lack of respect to ideas and contributions of other persons. On those grounds, in this paper we present a novel ecosystem to provide...
The mobile user behaviors data were usually collected by using embedded SDK in the Apps. However once too many device connected to the data collection system, the server has to deal with the high load. In this work, we design a new data collection strategy based on the FNV hash strategy in order to reduce the server load. Experimental results show that the strategy can effectively alleviate the pressure...
Peer-to-Peer (P2P) traffic shows a rapid growth in recent times. For efficient malware detection and network traffic management P2P network traffic classification is essential. The existing P2P traffic classification methods includes port-based, signature-based, pattern-based, and statistics based methods. However, none of these methods proved to be effective for the traffic classification in terms...
Wide range of researchers have explored and criticized the in-network caching performance for a set of algorithms, recently. While there are quite a few caching architecture proposals for Information-centric networks (ICN) to increase the effectiveness of it, there has also been criticisms against it stating that clever ideas do not improve the efficiency latency-wise. On the other hand, the default...
There are few Chinese dish recommendation algorithms due to the variety of Chinese dishes. It could be impossible to find one's most liked dishes in a restaurant through the name or the ingredients of a dish. The algorithm in this paper uses the user's ordering history to quantify one's taste by k-means clustering method and determines the number of user's favorite tastes by the BWP index. With the...
Spam web pages have posed great challenges to the development of search engines. The content spam is among the commonly used. Along with the development of Internet technologies, the content spam is difficult to detect. The current detection methods for the web page using content spam technique primarily rely on the statistical features, which has obvious limitations. In this article, a spam webpage...
In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distributed Denial of Service (DDoS) attacks against educational institutions. These attacks were effective enough to cause the online exams of hundreds of students to be cancelled. Surprisingly, these attacks were purchased by students from websites, known as Booters. These sites provide DDoS attacks as a...
Path-based graph algorithms are key building blocks for several link prediction and spatial mining applications. As the sizes of social, transport and communication networks expand, performing scalable traversal algorithms like SSSP are critical. While there is heightened interest in vertex-centric platforms for scalable graph analysis, there is limited literature on understanding the behavior of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.