4 research outputs found

    A Missing Piece of RSS Technology

    Get PDF
    In the Information Age, people use RSS (Really Simple Syndication) Technology to help them to easily get the latest contents from websites by accessing only a single website as well as by using mobile devices. Several companies have started to use RSS for distributing their information to customers. However, most contents published via RSS technology are public and not confidential such as credit card information, financial business information etc. Since the RSS technology does not have a mechanism to ensure that the incoming information is really secure, in this paper we have proposed a Secure Information Notifying System with RSS Technology (SInfoNS). We have applied the RSS technology together with the cryptography to make any RSS document become secure before disseminating it to relevant users. The SInfoNS also uses XSL to apply to private information retrieval and XML schema and SchemaPath definitions have been created for validation. The results displayed on a user's mobile device provide users with the latest information. The results of this study confirm that our system will aggregate RSS documents and disseminate information to each user. The SInfoNS enables RSS technology for the use of private information that can be securely distributed.Cryptography, Really Simple Syndication, RSS, XML Schema, XSL

    Selecting Root Exploit Features Using Flying Animal-Inspired Decision

    Get PDF
    Malware is an application that executes malicious activities to a computer system, including mobile devices. Root exploit brings more damages among all types of malware because it is able to run in stealthy mode. It compromises the nucleus of the operating system known as kernel to bypass the Android security mechanisms. Once it attacks and resides in the kernel, it is able to install other possible types of malware to the Android devices. In order to detect root exploit, it is important to investigate its features to assist machine learning to predict it accurately. This study proposes flying animal-inspired (1) bat, 2) firefly, and 3) bee) methods to search automatically the exclusive features, then utilizes these flying animal-inspired decision features to improve the machine learning prediction. Furthermore, a boosting method (Adaboost) boosts the multilayer perceptron (MLP) potential to a stronger classification. The evaluation jotted the best result is from bee search, which recorded 91.48 percent in accuracy, 82.2 percent in true positive rate, and 0.1 percent false positive rate

    The reuse of machining knowledge to improve designer awareness through the configuration of knowledge libraries in PLM

    Get PDF
    The nature of competition induces the need to constantly improve and perform better. For global aerospace manufacturers, this is as timely an epithet as ever as market forces urge for more growth, better financial return and market position. The macroeconomic aspect is compounded by the growth of product complexity and the need for higher product quality, hence the drive to reduce waste places emphasis upon production costs and the need to improve product performance. This paper focuses upon a rapid development and deployment method that enables the capture and representation of machining knowledge so that it may be shared and reused by design engineers to accelerate the design-make process. The study and mapping of information and knowledge relationships are described and put forward as a lightweight ontology. From this, a set of knowledge document templates were created to facilitate the capture, structuring and sharing of machining knowledge within a collaborative multidisciplinary aerospace engineering environment. An experimental pilot system has been developed to test and demonstrate that knowledge document templates can accelerate the sharing of machining knowledge within an industrial product lifecycle management environment. The results are discussed to provide a case for further development and application within the product domain

    The design and implementation of an application program interface for securing XML documents q

    No full text
    we employ some real examples to demonstrate that it is necessary to design an appropriate API for the securing system of subtree encryption for XML documents. The goal is to increase productivity and reduce the cost of maintaining this kind of software, for which we propose a document securit
    corecore