The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web log mining is the most important method in Web data mining, and data preprocessing is the primary work. In order to find more value access mode and reduce the data size from the Web, find the data of users and even between users, this paper puts forward a method of Web log data preprocessing based on user characteristic of interests, and then put forward some concepts such as user interest, user...
An automatic correcting system was designed to be able to correct the programming exercises during a Massive Open Online Course (MOOC) about Microcontrollers, followed by thousands of students. Build around the MSP430G Launchpad, it has corrected more then 30'000 submissions in 7 weeks. This document provides general information about the system, the results obtained during a MOOC on the Coursera...
This paper describes a robust, distributed, virtualized fault-tolerant framework for rapid response to catastrophic events such as earthquakes, land-slides, flooding, fire, and epidemics. The approach is distinguished in that fault tolerance in computing, communications, and storage, and the availability of relevant information content at the edge specific to the disaster scenario and location is...
Integrating large scale processing environments, such as Hadoop, with traditional repository systems, such as Fedora Commons 3, have long proved a daunting task. In this paper we show how this integration can be achieved using software developed in the SCAPE project. The SCAPE integration is based on four steps: retrieving the metadata records from the repository, reading the records and their references...
Network English learning refers to the student register account and completes the website or system learning tasks assigned by the teacher, the comprehensive test and online communication process. Teachers' management process is to supervise students' learning process and learning effect and query through the arrangement of learning tasks, comprehensive test results on students' learning situation...
Since increasing complexity and scale of modern software products imposes tight scheduling and resource allocations on software development projects, a project manager must carefully triage bugs to determine which bug should be necessarily fixed before shipping. Although in the field of Mining Software Repositories (MSR) there are many promising approaches to predicting, localizing, and triaging bugs,...
With the rapid development of network technology, human beings gradually stepped into a new era. College teaching way has not make full use of network resources, especially sports teaching, the traditional teaching method still occupies the dominant position. In recent years, as a result of college expansion, caused part of the site and the shortage of teachers College. The emergence of network teaching,...
At present, the mental health problems of college students has aroused widespread concern in society. The design and development of Mental health management system for university students has become increasingly important. Based on the characteristics of College Students' psychological health management, this paper explores the practical college mental health management system and through the B/S...
Sci-tech novelty retrieval (STNR) plays an important role in novelty retrieval of literature information in the colleges and universities. It can help experts to confirm novelty of sci-tech projects which are required for application and approval. In this study, we give the basic framework of the system, and build the mathematical models of the optimized processing system for STNR based on queuing...
Open course created new opportunities for individuals to learn and grow. Learners around the world have the opportunity to learn the world famous master lectures, have access to school teacher all kinds of courses. Learners have more learning opportunities, excellent course resources sharing. Crescent beyond the development of cloud computing technology for the further development and promotion of...
Detecting anomalous behaviour in network flow data is challenging for a number of reasons, including both the computational demand associated with a large corporate network and the peculiar temporal characteristics of flow data. Relay-like behaviour refers to the rapid commencement of an out-going flow from a network device following the completion of an in-coming flow. This paper develops a computationally...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
One traditional college service center system can only provide a variety of services for one college's students, and not be achieved in teachers and departments application in practice. In view of this, this paper design a new college service center system based on MVC pattern. Model-View-Controller (MVC) pattern is a software design pattern that is suitable for interactive system. This paper describes...
The information system audit is to record information system user activity in the behavior of a mechanism, it is not only able to identify who access to the system, and can be how to use the recording system, so as to provide the basis for the after process of security incidents. Of oracle security audit technology is applied to the teaching management information system, on the system of information...
The Internet and university campus network construction and popularization not only brings the new challenges to college education has brought unprecedented opportunities. Ideological and political education informatization is the inevitable developing trend of information age, but in the process of the concrete implementation in our country due to reasons such as cognition, and experience a lot of...
We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates users responding to phishing attack attempts and prevents access to phishing sites from the protected network. Although PhiGARo processes the phishing...
At present, countries around the world attach great importance to college students' employment. The employment of university graduates has also been a focus of social attention. Playing the advantages of university students hunting for a job on the Internet, on constructing and developing online self-employment service and employment information service and improving the employment information degree...
Detecting polling behaviour in a computer network has two important applications. First, the polling can be indicative of malware beaconing, where an undetected software virus sends regular communications to a controller. Second, the cause of the polling may not be malicious, since it may correspond to regular automated update requests permitted by the client, to build models of normal host behaviour...
The universities educational management System is a typical information management system, including the establishment and maintenance of backstage database and the development of frontstage application program. For the former, it requires a database of data consistency and integrity to build strong, full and good, and for the latter procedure, it requires full-functioned and easy to use and so on...
Recent years have seen a rapid growth in the number of virtual machines and virtual machine images that are managed to support infrastructure as a service (IaaS). For example, Amazon Elastic Compute Cloud (EC2) has 6,521 public virtual machine images. This creates several challenges in management of image files in a cloud computing environment. In particular, a large amount of duplicate data that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.