34 research outputs found

    Enhanced DNA Encoding Scheme in Honey Encryption

    Get PDF
    Nowadays, Security plays a vital role in protecting sensitive data from attackers in many organizations. Many researchers have developed security research to prevent attacks. Password-based encryption (PBE) is used to prevent an attacker from attempting to break into the password file. However, the current PBE is vulnerable because attackers can easily access keys by attempting again and again. The use of weak passwords in PBE is an ongoing problem. At present, Honey Encryption (HE) is an encryption method that overcomes (PBE) vulnerabilities. It is resistant to brute force attacks and allows encryption of data using minimal keys. HE generates a plausible message that looks real when the attacker decrypts with an incorrect key. Deoxyribo Nucleic Acid (DNA) is a new way of computing used in medical research. In this paper, DNA sequences are generated as the key distribution of Honey Encryption. The main idea of the paper is five random data lookup tables in the DNA encoding scheme in order to be more secure. It will be shown as the experimental results the same message encryption with the different passwords and the encryption of the different messages with the same password. In this system, diagnosis symptoms such as Influenza, Toothpaste, etc., will be used as the input messages of the DNA scheme. Compared to the results of only one data lookup table, it can be seen that the result of five data lookup tables in the key generation of DNA encoding sequence is more secure and less execution time. According to the experimental results, the proposed method is more secure than the existing method

    Information Extraction from Social Media

    No full text
    With the proliferation of social media sites, such as Twitter, Facebook, and LinkedIn, social streams have proven to contain the most up-to-date information on current events. Therefore, it is crucial to extract activities or events from the social streams, such as tweets and it become an ongoing research trend. Most approaches that aim at extracting event information from twitter typically use the context of messages. However, exploiting the location information of geo-referenced messages and the profile data are also important because tweet messages are short, fragmented and noisy, and therefore not include complete information about the events. For this, in this paper, a framework for event-extraction and categorization from Twitter is proposed. To extract the localized related activities, several mining mechanisms and cleaning techniques is used for real-time twitter corpus and various language processing approaches is applied for categorization the events and then the system will display the valuable information for the targeted domain

    Information Extraction from Social Media

    No full text
    With the proliferation of social media sites, such as Twitter, Facebook, and LinkedIn, social streams have proven to contain the most up-to-date information on current events. Therefore, it is crucial to extract activities or events from the social streams, such as tweets and it become an ongoing research trend. Most approaches that aim at extracting event information from twitter typically use the context of messages. However, exploiting the location information of geo-referenced messages and the profile data are also important because tweet messages are short, fragmented and noisy, and therefore not include complete information about the events. For this, in this paper, a framework for event-extraction and categorization from Twitter is proposed. To extract the localized related activities, several mining mechanisms and cleaning techniques is used for real-time twitter corpus and various language processing approaches is applied for categorization the events and then the system will display the valuable information for the targeted domain

    Information Extraction from Social Media

    No full text
    With the proliferation of social media sites, suchas Twitter, Facebook, and LinkedIn, social streamshave proven to contain the most up-to-date informationon current events. Therefore, it is crucial to extractactivities or events from the social streams, such astweets and it become an ongoing research trend. Mostapproaches that aim at extracting event informationfrom twitter typically use the context of messages.However, exploiting the location information of georeferencedmessages and the profile data are alsoimportant because tweet messages are short,fragmented and noisy, and therefore not includecomplete information about the events. For this, in thispaper, a framework for event-extraction andcategorization from Twitter is proposed. To extract thelocalized related activities, several mining mechanismsand cleaning techniques is used for real-time twittercorpus and various language processing approaches isapplied for categorization the events and then thesystem will display the valuable information for thetargeted domain

    Conversion of XML schema to data warehouse schema

    No full text
    Data warehousing technology aims atproviding support for decision making foroperational data. Defining a data warehouse fordata stored in XML (Extensible MarkupLanguage) format should be addressed as variousorganizationsuse XML to facilitate the promotionof their businesses. XML is a worldwide standardto represent data in web based system. Numbers oforganizations use XML for e-commerce andinternet based applications. This paper describesthe system that convert the XML schema into datawarehouse schema. XML schema for Russian Dollapproach is used as input and schema graph isconverted. And then fact, dimension tables arebeing identified from the schema graph. Datawarehouse schema is extracted from these fact,dimension tables and their relationship

    Enhanced Matrix based Frequent Accessed Pages Mining Algorithm

    No full text
    In computer science and Web miningwhich is an interdisciplinary subfield of computerscience, is the computational process ofdiscovering patterns in web log files. The overallgoal of the web mining process is to extractinformation from web log files and transform itinto an understandable structure for further use.In Web mining, Apriori is a classic algorithm forlearning association rules. This classicalalgorithm is inefficient due to so many scans ofdatabase and takes too much time to scan thedatabase. In this paper we will build a method toobtain the frequent page-item set by using adifferent approach to the classical Apriorialgorithm but based on it and applying theconcept of transaction reduction and a new matrixmethod

    Clustering XML Document Based On Path Similarities Using Structure Only

    No full text
    We propose a methodology for clustering XMLdocuments on the basis of their structuralsimilarities. This research combines the methods ofcommon XPath and K-means clustering that improvethe efficiency for those XML documents with manydifferent structures. The common XPath is used forsearching similarities between huge numbers of XMLdocuments’ paths. K-means clustering algorithm isessentially used to accurate clusters. In order tocluster the documents’ paths we indicate the steps bystep methods. The first step includes frequentstructure mining for searching similarities betweenthe huge amounts of XML documents’ structures byusing the F-P growth method. The second step buildsdimensional feature vector matrix by using extractedpaths. Based on the set of common path vectorscollected, we compute the structure similaritybetween the XML documents. And the last steputilizes the K-means clustering algorithm is used tocreate accurate clusters which are based on the ideaof using path based clustering, which groups thedocuments according to their common XPaths, i.e.their frequent structures. The quality of clusteringcan be measured on the dissimilarity of documentstructures. Also, experimental evaluation performedon both synthetic and real data shows theeffectiveness of our approach

    Clustering Homogeneous and Heterogeneous XML Documents by Summarizing Edge

    No full text
    Extensible Markup Language(XML) is amarkup language that defines a set of rules forencoding documents in format that is both humanreliableand machine-reliable. Large amount ofXML documents on the web require the developedclustering techniques to group.In this system,XEdgeclustering algorithm is applied for clusteringof the homogeneous and heterogeneous XMLdocuments in order to utilize in searchengine.LevelStructure and LevelEdge aregenerated from tree and then calculate similarityand distance metrics.X-Edge provides a structurerepresentation of XML documents based on edgessummaries.Finally, the outputs of the system areclusters for homogeneous and heterogeneous XMLdocuments. The advantage of this system is thatthe output clusters can be applied in the searchengine

    Query Processing for RDF data Using XML Repository

    No full text
    The Semantic Web, which represents a web ofknowledge, offers us new opportunities to search forknowledge and information. To harvest such searchpower requires robust and scalable datarepositories that can store RDF data. Most of theexisting RDF storage techniques rely on relationmodel and relational database technologies forthese tasks. The mis-match between the graphmodel of the RDF data and the rigid 2D tables ofrelational model jeopardizes the scalability of suchrepositories and frequently renders a repositoryinefficient for some types of data and queries. Inthis paper, we propose a system that can store RDFdata in the XML repository. This system serializesRDF data into RDF/XML and then maps into aXML document. We discuss the basic idea ofserializing RDF data into RDF/XML and thenmapping of RDF/XML to XML document

    Using Case-Based Reasoning to Hotel Recommendation System

    No full text
    Web-based application is currently a hotresearch and development area. Thousands of applications havebeen made available on the Web, but the problem is that most ofthem are nothing more than a network of static hypertext pages.This system aimed at supporting a leisure traveler to staycomfortable of selecting a hotel, selecting a hotel for weddingand to do a meeting or conference. The system enables theuser to identity his/her own destination and to personalize thehotel by aggregating elementary items (additional locations tovisit, services and activities). To reduce time for finding hoteland to give an immediate answer to the user by exploring thecumulative experiences from previous user’s answers for thebenefit of new . This system represents a hotel recommendationsystem by using Case-based Reasoning. Case-based reasoningis an artificial intelligence approach to learning and problemsolving based on experience. To retrieve match cases from thecase based that is similar to the user’s choose by using nearestneighbor algorithm technique. From the system, user can chooserelevant hotel according to their needs and interests activitiesand reduce time for the user
    corecore