The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet has become a more popular medium of sharing the opinions or feedback about particular topics. The feedbacks are often in the form of numerical ratings and text. Numerical ratings are easily processed but waste amount of unstructured textual data present on the internet in the forms of web blogs, emails, customer experiences, tweets etc that is left unprocessed. This data should be processed...
Network traffic classification is important for QoS, Network management and security monitoring. Current method for traffic classification such as port based or payload based suffered many problems. Newly emerged application uses encryption and dynamic port numbers to avoid detection. So we use unsupervised machine learning approach to classify the network traffic. In this paper unsupervised K-means...
The software defined networking (SDN) allows separating control and data plane, which provides better network management and higher utilization for data center network. Among these topical applications in SDN, such as traffic engineering, QoS and network management, there is significant interest on classifying the flows and predict future traffic. Classification plays an important role in SDN, especially...
In this paper, we propose an anti-phishing technique to safeguard users against phishing attacks in the internet. The scope of our study focuses primarily on the detection of phishing websites with English content. In order to convince users on whom the website claims to be, phishers normally place brand names in different parts of the URL. We exploit this phishing pattern by assigning weights to...
In this paper, we study on the popularity prediction of online user-generated contents, where high quality predictions give us much more flexibility and preparing time in deploying limited resources (such as advertising budget, monitoring capacity) into more popular contents. However the high retrieval cost of data used in prediction is a big challenge due to the large amount of users and contents...
Existing personalized recommendation systems are facing many problems such as cold start, data sparseness and high complexity. Users' interests exist more widely and are more personalized compared with purchasing history in traditional recommendation systems. Thus, applying the interest graph in the recommendation process can make up certain shortages. This paper builds the mechanism of a user-interest-goods...
Internet traffic exhibits self-similarity and long-range dependence (LRD). Accurate estimation of statistical parameters characterizing self-similarity and LRD is an important issue, aiming at best modelling traffic e.g. to the purpose of network simulation. Major attention has been devoted to designing algorithms for estimating the Hurst parameter H of LRD traffic series or, more generally, the exponent...
With the growth of the Internet and electronic commerce, there is more and more review data on the Internet. Quite a lot of Internet users refer to related comments of a product before they make a decision, which can teach them about the quality and reputation of the product and help them decide whether to buy it. A system that can automatically classify the polarity of a given text would be a great...
CCFIR (Compact Control Flow Integrity and Randomization) has low performance overhead as an exploit mitigation, but it is hard to mitigate exploits by hijacking virtual function pointer, which are emerging in recent years. Because of the polymorphism of virtual functions, CCFIR can't determine a unique spring board stub. We propose a new practical protection method named SDCFI (Static-Dynamic Control...
With the rapid development of the Internet, SNS services and 3G commercial mobile applications which brings tremendous opportunity, although the time on the development of SNS is very short in China, social web game is in the early stage of development, because of massive user, the potential commercial value of Chinese SNS is still a great mining space. A relatively large defects is the precipitation...
Demographic information is usually treated as private data (e.g., gender and age), but has been shown great values in personalized services, advertisement, behavior study and other aspects. In this paper, we propose a novel approach to make efficient demographic prediction based on smartphone application usage. Specifically, we firstly consider to characterize the data set by building a matrix to...
Communication between different nations is essential. Languages which are foreign to another impose difficulty in understanding. For this problem to be resolved, options are limited to learning the language, having a dictionary as a guide, or making use of a translator. This paper discusses the development of ASEANMT-Phil, a phrase-based statistical machine translator, to be utilized as a tool beneficial...
Delay is one of the main parameters in determining quality of service and topology of network. One way delay provides us with more information than that a round trip time does and it also involves more intricate calculations. In this paper, two measuring devices are designed and implemented that can measure the one way delay present between two distant points in web environment using GPS clock and...
Proliferation of health related information on the internet is both welcoming and a concern. For instance when solicited information goes wrong, it tends to have dire consequences on the general public. Assessing the quality of internet health information is often difficult but a rational and systematic approach can be useful in evaluating the quality of the services they render to the public. The...
With the rapid growth of the Internet, the importance of application traffic analysis increases for efficient network management. The statistical information in traffic flows, can be efficiently utilized for application traffic identification. However, the packet out-of-order and retransmission generated at the traffic collection point reduce the performance of the statistics-based traffic analysis...
Nowadays, microblogging is becoming a part of people living in network. Because of the importance of popular topic mining, microblogging popular topic mining technology receive widely attention. This paper introduces a popular topic mining method based on microblogging. First of all, we pretreat microblogging content, such as remove noise words and stop words for word analysis in next stage. Next,...
The accurate geographic location of the IP address is useful and important in different areas nowadays, like targeting online advertisement, increasing network availability and avoiding large-scale network attack. So it attracts a lot of researchers and industries to study. In this paper, we will introduce the chief methods of the IP geolocation in the world and put forward our suggestions and prospected...
Research shows that Twitter is being misused as a platform for online radicalization and contains several hate and extremism promoting users and tweets violating the community guidelines of the website. Manual identification of such tweets is practically impossible due to millions of tweets posted every day and hence solutions to automate the task of tweet classification is required for Twitter moderators...
Phishing is an act of stealing personal and sensitive user information through internet and using it for financial transactions. The goal of phishers is to carry out fraudulent transactions on behalf of the victims by using the information stealed from them. Availing the services of internet has become a dangerous task to the common people with these kinds of attacks. Many methods have been developed...
Citizens of any country face civic problems in their day to day lives. They resort to the one of the several ways provided by the government to file their complaints. With advancements in technology, the complaint registration systems have evolved in different ways to simplify the task of registering as well as addressing the complaints. This research paper presents the architecture of a GPS based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.