The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional anti-tampering system can not guarantee its own security. in order to reduce tampering and ensure the integrity of Web pages and web server security and the stability of operation, the paper analyzes the current anti-tampering technology of several webs, and introduces the model three-threading technology based on the existing anti-tampering technology and the multi-ring structure of the...
With the high development of Internet, e-commerce websites now routinely have to work with log datasets which are up to a few terabytes in size. How to remove messy data timely with low cost and find out useful information is a problem we have to face. The mining process involves several steps from pre-processing the raw data to establishing the final models. In this paper we describe our method to...
Sales on the Internet have increased significantly during the last decade, and so, it is crucial for companies to retain customers on their web site. Among all strategies towards this goal, providing customers with a flexible search tool is a crucial issue. In this paper, we propose an approach, called TIGER, for handling such flexibility automatically. More precisely, if the search criteria of a...
Automatic titling (i.e. providing titles) is one of key domains of Web site accessibility. This paper provides an approach allowing the automatic titling of texts (e.g. emails, fora, etc.) relying on the morphosyntactic study of human written titles in a corpus of various texts. The method is developed in four stages: Corpus acquisition, candidate sentences determination for titling, noun phrase extraction...
To take advantage of the Internet - vast but complicated information resources, Recommendation systems help users find out information they need by providing them personalized suggestions. This research area is receiving more and more attention from researchers and used in some famous websites like EBay, Amazon, etc. In this paper, we proposed a Recommendation System for Vietnamese electronic newspaper...
The first phase of the conceptual modeling process is the acquisition of knowledge about the real world system. One issue in this phase is the need for clear communication, between the modeler, and experts on the system being examined. These domain experts may not be versed in modeling techniques or languages. Another issue is the potential benefit offered by the recording of the gathered knowledge,...
Feather selection is a process that extracts a number of feature subsets which are the most representative of the original meaning from original feature set. It greatly reduces the text processing time and increases the accuracy because of removing some data outliers. With the rapid development of Web 2.0 and the further evolution of the Internet, short text like micro-blog plays an important role...
With the coming of knowledge economy era and the popularization of lifelong learning, the informal learning has become highly valued. Web2.0 provides a tremendous support for the informal learning with its free, open, decentralized, aggregation, interactive features. In this paper, combining with the practical learning of college students, we construct the model of informal learning based on Web2...
The growth of e-commerce in recent years has opened up new trade avenues for enterprises. It is clear that internet websites in this context are playing an important role as the medium of information dissemination. Many studies have been shown that 2-D representations of products are no longer impressive on websites than before, since demands for custom-designed products are rapidly increasing. In...
By comparing the content of Chinese and American B2C Home furniture web sites, this paper tries to use the Chi-square test of independence to determine whether there are significant differences between them and take charge of a set of index system to compare the content of these web sites. The data for this study comes from 25 Chinese and 25 American Home furniture web sites. In fact, this paper finds...
E-governments are increasingly becoming a familiar fixture. Nations across the world are realizing the importance of e-government, the main objective of most e-government is to better serve citizens. However, citizen's likelihood to use e-government is low. Lack of trust has been recognized as one of the most barriers to citizen for engaging in e-government, involving the trust in the internet and...
At present, computer science teaching exists critical problems. Emerging technologies of information and communication have been attracting the attention of teachers and researchers in recent years. Constructivism is a learning theory found in psychology which explain how people might acquire knowledge and learn. It therefore has direct application to education. Based on constructivism this paper...
Along with the electronic commerce development, the behavior of shopping online becomes more common. It is to be hoped that compare prices in different shopping website before you buying. As a distributed intelligent technology, multi-agent is used in Comparison Shopping Website, to improve the customer shopping experience and online shopping services quality. In this paper, multi-agent technology...
Malicious web pages that launch client-side attacks on web browsers have became a severe threat in today's Internet. High-interaction client honeypots are security devices that detect these malicious web pages on a network. However, high-interaction client honeypots are not good enough for detecting malicious web pages, especially for web pages carrying rootkit which is used to hide the presence of...
This paper constructed a web site supervision system to analyze the sentiment orientation of the articles (document, text) on the web sites in intranet. A scheme based on Vector Space Model (VSM) is put forward for identifying the sentiment orientation of document. Considering the feature of a document is relative to the term frequencies appears in the document and corpus, we extract the feature of...
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which involves information sharing. However, the awareness about privacy concerns and security threats have caused to non-sharing behavior among the Internet Users. This situation have caused...
In the past, many researches have examined and addressed the notion of trust multidimensional in concepts within the areas of e-commerce ranging from business to business (B2B), business to consumer (B2C) and consumer to consumer (C2C). Indeed, the element of trust is vital in ensuring the success of e-commerce. However, the web evolution has moved the interpersonal and inter-organizational transactions...
Phishing is the criminal activity of enticing people into visiting websites that impersonate the real thing, to dupe them into revealing passwords and other credentials to carry out financial fraud. This less suspected and high profile attack lays a deceit trap to the unwitting and gullible customers to part with their sensitive credentials to unauthorized entities. The inherent suave and subtle vulnerabilities...
Theme of E-Governance admits agile and ameliorated citizen service from a quantitative and qualitative point of view. An efficacious e-Governance system ascertains completion of administrative tasks in a nimble way reducing bureaucracy through a transparent protocol being robust against corruption. With the increased utilization and adaptation of the information and communication technologies (ICT),...
Industry has responded to the ever-growing presence of spam by attacking the spam distribution infrastructure, essentially trying to prevent spam email from ever landing in the inbox of end-users. Recently, industry and academia have begun investigating the web hosting infrastructure of spam campaigns, attacking spammers where it hurts most, in their pocketbooks. Spammers have responded by introducing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.