166 research outputs found

    Survey on Web Spam Detection using Link and Content Based Features

    Get PDF
    Web spam is one of the recent problems of search engines because it powerfully reduced the quality of the Web page. Web spam has an economic impact because spammers provide a large free advertising data or sites on the search engines and so an increase in the web traffic volume. In this paper we Survey on efficient spam detection techniques based on a classifier that combines new link based features with language models. Link Based features are related to qualitative data extracted from the web pages and also to the qualitative properties of the page links. Spam technique applies LM approach to different sources of information from a web page that belongs to the context of a link in order to provide high quality indicators of web spam. Specifically Detection technique applied the Kullback Leibler divergence on different combinations of these sources of information in order to characterize the relationship between two linked pages

    Electrostatics in chemistry. 3. Molecular electrostatic potential: visualization and topography

    Get PDF
    Topographical features of the electrostatic potential of molecules (MESP) are discussed. Three-dimensional visualization of the MESP of some small molecules is presented. The details are correlated with the reactivity of molecules

    Acknowledgement Based Secure Intrusion Detection System Against Worm Hole Attack For Manets

    Get PDF
    The wireless network possible mobility and scalability in many applications. Wireless Mobile Ad hoc Network (MANET) is one of the most important and unique applications. There is an emerging technology and has a large force to be applied in critical situations such as military applications, battlefields and commercial applications. MANET each node is to have free routing and the ability to move in all directions that MANET has no centralized infrastructure. However, medium and large open distribution nodes in MANET towards safety. MANET also includes wireless sensor nodes, these sensor nodes in the environment unattended therefore increases the chances of attacks increases, there are many types of attacks such Wormhole, DDOS, denial of service, etc. black hole . The wormhole is one of them. The network assigns vortex increasing the routing load at the end of end delay, packet loss and many other parameters. It is therefore very important to design and develop effective intrusion detection system to protect against attacks MANET Wormhole. In it, we discuss Wormhole attack on MANET, and to propose and implement a new system of intrusion detection based on the recognition to detect the Wormhole attack type and provide security against it using hybrid encryption for packets recognized

    A Review on Computer Forensics

    Get PDF
    Activities cyber crimes have become worse important part of everyday life in both the corporate world and the general public. The phenomenon of digital crime achieved what one might call the overwhelming factor. This explores the need for computer forensics to exercise effective and legal way, and describe the basic technical issues, and a reference point for further reading. It promotes the idea that competent practice in computer science and awareness of the fundamental laws of the retina for organizations today. This is an important topic for managers who need to understand how come a strategic element of computer science in the public information organization IT security. Network administrators and other IT security staff members need to understand the issues related to computer science. Those who work in the field of corporate governance, legal services, information technology, or find an overview of Sciences

    Auto-Summarization of Email Document Using Statistical Approach

    Get PDF
    In today’s world email communication is growing with fast rate. Thousands emails are coming into user inbox and he is not able to read each and every email documents. so users need such system by which they can classify and summarize emails. This paper discusses an email auto summarization system using statistical approach which uses vector space algorithm. It generates a summary for an email document from mail Inbox of email server. Our system is based on identification and extraction of important sentences from the input email document file. We listed a set of features that we collect as part of summary generation process. These features were stored using vector representation model. We defined a ranking function which ranks each sentence as a linear combination of the sentence features. We also discussed about techniques to achieve coherent and readable summaries of email message documents. The proposed system showed that the extraction based and position based email document summary generated is coherent the selected features are really helpful in extracting the important information from email documents. That generated summary will be displayed at client application interface. On that summary base we can classify emails. DOI: 10.17762/ijritcc2321-8169.15012

    Giant peripheral osteoma of the mandible

    Get PDF
    Osseous expansion of any body part is an unwelcome guest and deep are its impacts when it is located on the face. The bigger the lesion, the more bitter is the psychosocial trauma to the affected individual. This article describes the case of a 50 year old female who presented with painless swelling of the right submandibular region manifesting as a dreadful cosmetic disfigurement. The mass had been progressing slowly for the last 15 years. Imaging showed a giant peripheral osteoma of 10.8 cm involving buccal and lingual surface of the body, ramus, angle and inferior border of the right side of mandible. To the best of our knowledge, a giant peripheral osteoma of mandible having size more than 10 cm has never been reported earlier.KEYWORDS: Giant peripheral osteoma; Swelling of mandible; CT scan, Panoramic viewInternet Journal of Medical Update 2012 January;7(1):66-6
    • …
    corecore