184,806 research outputs found

    Denial of Service in Voice Over IP Networks

    Get PDF
    In this paper we investigate denial of service (DoS) vulnerabilities in Voice over IP (VoIP) systems, focusing on the ITU-T H.323 family of protocols. We provide a simple characterisation of DoS attacks that allows us to readily identify DoS issues in H.323 protocols. We also discuss network layer DoS vulnerabilities that affect VoIP systems. A number of improvements and further research directions are proposed

    Graph-based Features for Automatic Online Abuse Detection

    Full text link
    While online communities have become increasingly important over the years, the moderation of user-generated content is still performed mostly manually. Automating this task is an important step in reducing the financial cost associated with moderation, but the majority of automated approaches strictly based on message content are highly vulnerable to intentional obfuscation. In this paper, we discuss methods for extracting conversational networks based on raw multi-participant chat logs, and we study the contribution of graph features to a classification system that aims to determine if a given message is abusive. The conversational graph-based system yields unexpectedly high performance , with results comparable to those previously obtained with a content-based approach

    Mosque architecture in Malaysia : classification of styles and possible influence

    Get PDF
    The main purpose of the research is to set up an initial framework of architectural description of Muslim architecture in Malaysia within the context of the architectural concern of ‘style’. The main concern is to elucidate clearly the different architectural styles of Muslim architecture and suggest hypotheses for future studies in relation to the forces which might have been instrumental in the conception of these styles. The research is important in order to project the message that much of what we understand as ‘Islamic Architecture’ in the present literature comes from various artistic and political agendas that have questionable merits compared to an analytical approach of Islamic architecture from the Qur’an and the Sunnah of the Prophet Muhammad (peace be upon him). The research is also important for practicing architects to understand that the present syntax of ‘Islamic Architecture’ with its references in Middle Eastern, Mid Asian and African models are not necessarily the best precedence to project the architectural message of Islam. As opposed to the three classification of Traditional, Colonial and Modern styles of mosque architecture, the research has identified seven main styles with a suggestion of the rationale and influences of those styles

    Investigation of fast initialization of spacecraft bubble memory systems

    Get PDF
    Bubble domain technology offers significant improvement in reliability and functionality for spacecraft onboard memory applications. In considering potential memory systems organizations, minimization of power in high capacity bubble memory systems necessitates the activation of only the desired portions of the memory. In power strobing arbitrary memory segments, a capability of fast turn on is required. Bubble device architectures, which provide redundant loop coding in the bubble devices, limit the initialization speed. Alternate initialization techniques are investigated to overcome this design limitation. An initialization technique using a small amount of external storage is demonstrated

    Abusive Language Detection in Online Conversations by Combining Content-and Graph-based Features

    Full text link
    In recent years, online social networks have allowed worldwide users to meet and discuss. As guarantors of these communities, the administrators of these platforms must prevent users from adopting inappropriate behaviors. This verification task, mainly done by humans, is more and more difficult due to the ever growing amount of messages to check. Methods have been proposed to automatize this moderation process, mainly by providing approaches based on the textual content of the exchanged messages. Recent work has also shown that characteristics derived from the structure of conversations, in the form of conversational graphs, can help detecting these abusive messages. In this paper, we propose to take advantage of both sources of information by proposing fusion methods integrating content-and graph-based features. Our experiments on raw chat logs show that the content of the messages, but also of their dynamics within a conversation contain partially complementary information, allowing performance improvements on an abusive message classification task with a final F-measure of 93.26%

    Advances in optimal routing through computer networks

    Get PDF
    The optimal routing problem is defined. Progress in solving the problem during the previous decade is reviewed, with special emphasis on technical developments made during the last few years. The relationships between the routing, the throughput, and the switching technology used are discussed and their future trends are reviewed. Economic aspects are also briefly considered. Modern technical approaches for handling the routing problems and, more generally, the flow control problems are reviewed
    corecore