The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Associative data mining is the research hotspot in the field of big data, and frequent item sets mining is an important step in the analysis of associative data. This paper focuses on analyzing the frequent item sets mining algorithm based on Apriori parallel algorithm. The paper has found two shortages of Apriori parallel algorithm: one is that the key value pair are too many, another is that in...
An innovative system is proposed for using mobile devices for remote recognition. When the user draws a pattern in the local browser, the pattern is transmitted to a remote server that immediately performs the recognition task and database search. The recognition system uses bidirectional associative memory (BAM) with artificial neural network technology. This study is based on the example of buying...
The initial stage of the conceptual product design process is a highly creative and intensive knowledge-exploration intensive process. Sources of information utilized by design teams span local databases to internet collections and online magazines. Finding the relevant information is a challenge for a single product design team as the amount of information available continues to increase. In this...
Our proposed methodology allows to calculate the economic value and evaluate the performance, for each of the components of a website. Currently, to assess a website, there are several techniques: expert assessment, business performance factors, valuation algorithms or income and expenses of the website. These methods incorporate a subjective estimate to determine income — they incorporate income...
Advanced Persistent Threat, one of the most popular network attacks, has drawn great attention of all over the world because of its huge perniciousness. As the excellent imperceptibility as well as long-term persistence in APT attack, this paper proposes a prediction model based on dynamin Bayesian game. Focusing on the particular features in APT, a corresponding quantitative method is proposed for...
In this paper we present a time behavioral analysis of a simulated botnet network traffic, collected and discovered from NetFlow messages. More specifically said - lifespans. The technique, which we used, is focused on to model command and control communication in a botnet network. The lifespan of this referred traffic is modeled by lifelines using Python language.
Cyber attackers abuse the domain name system (DNS) to mystify their attack ecosystems, they systematically generate a huge volume of distinct domain names to make it infeasible for blacklisting approaches to keep up with newly generated malicious domain names. As a solution to this problem, we propose a system for discovering malicious domain names that will likely be abused in future. The key idea...
Nowadays, the internet of things has been improved greatly with the progress of the sensor, big data, mobile Internet and other relative technologies. One water fountain with intelligent monitoring system based on the internet of things is discussed in this paper. The key parameters of the water fountain were derived from the sensors and transmitted the encrypted data by GPRS or WIFI net to central...
In spite of significant on-going research, the Border gateway protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP prefixes for ASes (Autonomous Systems). In this context, a number of research studies focused on securing BGP through historical-based and statistical-based behavioural models. This paper suggests a novel method based on tracking...
Methodology eLearning improves educational and promotes to share and collaborate. This work presents a way to analyze and automate log files from the educational forums in a course of virtual learning systems. We have developed a piece of software to process the logs files. Text reports and database files are produced. Then it is possible to study them and to obtain conclusions about the work of our...
With the development of science and technology, more people especially young teenagers do not want to pay more attention to traditional TV programs. Nowadays the challenge of traditional TV station is how to attract the audience's attention, so as to improve the audience rating of tradition TV programs. This paper proposes a recommendation system, which can improve audience rating. This system mainly...
This paper proposes a disaster information system using the geofencing technology to detect the movement of users and provide information of the risk for them. The system is composed of client-server architecture; the server collects risk information from various information sources and the client watches the user to notify the information as the need arises. To detect the user's movement, the client...
Traceroute is largely considered as the number-one tool when troubleshooting the network, with innumerable applications, such as pinpointing the routing deficiencies or detecting and locating network outages. Previous works have extensively investigated pitfalls and flaws causing the measurements performed with this tool to be inaccurate or incomplete. In this paper, we show how, even in the absence...
Nowadays, the internet is playing a major role in everyday life, becoming the first choice for sharing information. In the last sixteen years the number of websites increased from three million to almost one billion. An important contribution to this number was brought by the content management systems which provided an easy approach for any user to create its own website without having advanced programming...
This project aims to implement virtual shopping arcade via GSM network implementation. The new innovation on online shopping requires people to have internetworking connection. This project however is developed to target mobile phone users to do shopping virtually without the needs of having data subscription account in their mobile phone. The system is built using several tools such as visual basic...
This paper discuss the project results of the centralized storage for the client generated statistical data. The project aims was to fill the following requirements: (1) a new web API where local client statistics can be reported to a highly scalable and redundant central database, (2) to enable a user to easily save/share their connection results on a separate webpage, or with a widget that could...
In recent times there has been a decline in the confidence of common people over electronic voting machines (EVMs). More anticipated than what the reality actually is, today's automated vote casting methods have faced immense controversy related to being vulnerable to hacking and questions have been raised about their transparency and security. This paper proposes the design and development of a novel...
Authentication of digital audio has become indispensable for validating genuine information, especially in very important situations involving legal issues. Study in audio authentication especially for AAC audio is still limited and the conventional authentication techniques are mostly applicable to MP3 audio and uncompressed audio. In this work, we propose an authentication scheme for AAC compressed...
This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures. It also exposes the issue of spam from an Internet registry perspective, as an important element of the Internet technical infrastructure. We found out that, an RIR itself is not mandated to fight spam but it maintains a registry that is of...
Due to recent advances in new camera technologies and the Internet, millions of videos can be easily accessed from any place at any time. A significant amount of these videos are for surveillance, and include actors such as humans and vehicles performing different actions in dynamic scenes. The goal of this study is to analyze human crowd motions in videos. More specifically, moving humans are tracked...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.