184,806 research outputs found
Denial of Service in Voice Over IP Networks
In this paper we investigate denial of service (DoS) vulnerabilities in Voice over IP (VoIP) systems, focusing on the ITU-T H.323 family of protocols. We provide a simple characterisation of DoS attacks that allows us to readily identify DoS issues in H.323 protocols. We also discuss network layer DoS vulnerabilities that affect VoIP systems. A number of improvements and further research directions are proposed
Graph-based Features for Automatic Online Abuse Detection
While online communities have become increasingly important over the years,
the moderation of user-generated content is still performed mostly manually.
Automating this task is an important step in reducing the financial cost
associated with moderation, but the majority of automated approaches strictly
based on message content are highly vulnerable to intentional obfuscation. In
this paper, we discuss methods for extracting conversational networks based on
raw multi-participant chat logs, and we study the contribution of graph
features to a classification system that aims to determine if a given message
is abusive. The conversational graph-based system yields unexpectedly high
performance , with results comparable to those previously obtained with a
content-based approach
Mosque architecture in Malaysia : classification of styles and possible influence
The main purpose of the research is to set up an initial framework of architectural description of Muslim architecture in Malaysia within the context of the architectural concern of ‘style’. The main concern is to elucidate clearly the different architectural styles of Muslim architecture and suggest hypotheses for future studies in relation to the forces which might have been instrumental in the conception of these styles. The research is important in order to project the message that much of what we understand as ‘Islamic Architecture’ in the present literature comes from various artistic and political agendas that have questionable merits compared to an analytical approach of Islamic architecture from the Qur’an and the Sunnah of the Prophet Muhammad (peace be upon him). The research is also important for practicing architects to understand that the present syntax of ‘Islamic Architecture’ with its references in Middle Eastern, Mid Asian and African models are not necessarily the best precedence to project the architectural message of Islam. As opposed to the three classification of Traditional, Colonial and Modern styles of mosque architecture, the research has identified seven main styles with a suggestion of the rationale and influences of those styles
Investigation of fast initialization of spacecraft bubble memory systems
Bubble domain technology offers significant improvement in reliability and functionality for spacecraft onboard memory applications. In considering potential memory systems organizations, minimization of power in high capacity bubble memory systems necessitates the activation of only the desired portions of the memory. In power strobing arbitrary memory segments, a capability of fast turn on is required. Bubble device architectures, which provide redundant loop coding in the bubble devices, limit the initialization speed. Alternate initialization techniques are investigated to overcome this design limitation. An initialization technique using a small amount of external storage is demonstrated
Abusive Language Detection in Online Conversations by Combining Content-and Graph-based Features
In recent years, online social networks have allowed worldwide users to meet
and discuss. As guarantors of these communities, the administrators of these
platforms must prevent users from adopting inappropriate behaviors. This
verification task, mainly done by humans, is more and more difficult due to the
ever growing amount of messages to check. Methods have been proposed to
automatize this moderation process, mainly by providing approaches based on the
textual content of the exchanged messages. Recent work has also shown that
characteristics derived from the structure of conversations, in the form of
conversational graphs, can help detecting these abusive messages. In this
paper, we propose to take advantage of both sources of information by proposing
fusion methods integrating content-and graph-based features. Our experiments on
raw chat logs show that the content of the messages, but also of their dynamics
within a conversation contain partially complementary information, allowing
performance improvements on an abusive message classification task with a final
F-measure of 93.26%
Advances in optimal routing through computer networks
The optimal routing problem is defined. Progress in solving the problem during the previous decade is reviewed, with special emphasis on technical developments made during the last few years. The relationships between the routing, the throughput, and the switching technology used are discussed and their future trends are reviewed. Economic aspects are also briefly considered. Modern technical approaches for handling the routing problems and, more generally, the flow control problems are reviewed
- …