scholarly journals Development of Geoinformation Technology for Monitoring Events on the Basis of Data from Unstructured Web Resource Text

The article studies unstructured text from the informational web resources as a source of obtaining of geospatial data about current events in real time. Authors propose a scheme of construction of the geoinformation technology for monitoring events through the data of the unstructured web resource text, that will allow to collect and visualize geospatial and descriptive information about events on specific topics automatically and in real time. Key elements of the proposed methodology are geoparsing of unstructured text, geocoding of detected coordinates or addresses, and storing of results in the geodatabase. Proposed technology allows to create a web application for automatic identification and monitoring of events (objects) by parameters of their category, location and time. For the purposes of developing this system, authors proposed to use free software (except for ArcGIS Pro). This factor can be attributed to the advantages of the proposed technology.

2019 ◽  
Vol 18 (02) ◽  
pp. 1950013
Author(s):  
Jamuna S. Murthy ◽  
G. M. Siddesh ◽  
K. G. Srinivasa

Twitter is considered as one of the world’s largest social networking sites which allow users to customize their public profile, connect with others and interact with connected users. The proposed work introduces a distributed real-time twitter sentiment analysis and visualization framework by implementing novel algorithms for twitter sentiment analysis called Emotion-Polarity-SentiWordNet. The framework is applied to build an interactive web application called “TwitSenti” which can benefit companies and other organizations in knowing the people’s sentiment towards the aspects such as brands, current events, etc., which in turn helps in quick decision-making and planning marketing strategies. The algorithm is validated against three existing classifiers and hence proved that Emotion-Polarity-SentiWordNet provides highest accuracy value of 85%. Also, the framework showed best scalability results when evaluated through web app as four node clusters, proves to be fast and can scale well with massive data.


Author(s):  
Артём Григорьевич Тецкий

The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out among the sites of competitors. Often, the owners of Web resources understood the possible consequences of cyber-incident only after when their resource was attacked. This paper discusses the frequent causes of attacks of Web-applications created with the content management systems. A content management system allows to create sites without directly writing code. The main sources of information about frequent security problems of Web-resources are documents of organizations OWASP, SANS, Positive Technologies. Due to the high activity of intruders, it is necessary to create methods for assessing the security of the Web-application and methods for countering attacks. In the paper, the need to assess the probability of a successful attack of Web-applications is conditioned. In practice, it is impossible to determine all possible attack scenarios, because each Web-application has its own functionality. The frequent attack scenarios on which the tree was built are investigated. The method of estimating the probabilities of basic events using expert assessments based on the results of the preliminary implementation of a set of measures to identify the security problems is used. The developed method of assessing security allows to consider not only possible vulnerabilities in the source code, but also possible security policy violations. The proposed method can be applied by business entities working in the field of information security, when choosing security measures for a particular Web-application. A further direction of research is the development of a method for choosing countermeasures based on the described method. The method should demonstrate the effect of each countermeasure on the probability of a successful attack


2021 ◽  
Vol 10 (7) ◽  
pp. 489
Author(s):  
Kaihua Hou ◽  
Chengqi Cheng ◽  
Bo Chen ◽  
Chi Zhang ◽  
Liesong He ◽  
...  

As the amount of collected spatial information (2D/3D) increases, the real-time processing of these massive data is among the urgent issues that need to be dealt with. Discretizing the physical earth into a digital gridded earth and assigning an integral computable code to each grid has become an effective way to accelerate real-time processing. Researchers have proposed optimization algorithms for spatial calculations in specific scenarios. However, a complete set of algorithms for real-time processing using grid coding is still lacking. To address this issue, a carefully designed, integral grid-coding algebraic operation framework for GeoSOT-3D (a multilayer latitude and longitude grid model) is proposed. By converting traditional floating-point calculations based on latitude and longitude into binary operations, the complexity of the algorithm is greatly reduced. We then present the detailed algorithms that were designed, including basic operations, vector operations, code conversion operations, spatial operations, metric operations, topological relation operations, and set operations. To verify the feasibility and efficiency of the above algorithms, we developed an experimental platform using C++ language (including major algorithms, and more algorithms may be expanded in the future). Then, we generated random data and conducted experiments. The experimental results show that the computing framework is feasible and can significantly improve the efficiency of spatial processing. The algebraic operation framework is expected to support large geospatial data retrieval and analysis, and experience a revival, on top of parallel and distributed computing, in an era of large geospatial data.


2021 ◽  
Vol 4 ◽  
pp. 13-19
Author(s):  
E.M. Markushin ◽  
◽  
K.E. Ognegin ◽  
P.S. Polskaya ◽  
A.A. Popov ◽  
...  

The article discusses the decision of some problems connected with the distribution of increased state academic scholarships, such as: late submission of documents, lengthy processing of applications, the paper version of the filing documents that complicate the process of submission and consideration of applications and documents into a higher state academic scholarship, thereby increasing the burden on the members of the scholarship Commission and directorates of the institutions.The aim of this work is to find ways to improve the efficiency and accessibility of this process through an information system that will allow you to submit achievements for authentication and applications for an increased state academic scholarship online, track your position in the ranking in real time, view the achievements of other students directly from the rating system.Information system design is implemented using a new stack of information design and development approaches. The article pays special attention to the design of the database and the interface part of the application. The article presents a working web application “administration of the achievement accounting system”.


2021 ◽  
Author(s):  
Joshua Power ◽  
Derek Jacoby ◽  
Xi Sun ◽  
Matt Plaudis ◽  
Marc-Antoine Drouin ◽  
...  

2017 ◽  
Author(s):  
James Hadfield ◽  
Colin Megill ◽  
Sidney M. Bell ◽  
John Huddleston ◽  
Barney Potter ◽  
...  

AbstractSummaryUnderstanding the spread and evolution of pathogens is important for effective public health measures and surveillance. Nextstrain consists of a database of viral genomes, a bioinformatics pipeline for phylodynamics analysis, and an interactive visualisation platform. Together these present a real-time view into the evolution and spread of a range of viral pathogens of high public health importance. The visualization integrates sequence data with other data types such as geographic information, serology, or host species. Nextstrain compiles our current understanding into a single accessible location, publicly available for use by health professionals, epidemiologists, virologists and the public alike.Availability and implementationAll code (predominantly JavaScript and Python) is freely available from github.com/nextstrain and the web-application is available at nextstrain.org.


2022 ◽  
Vol 2 (14) ◽  
pp. 26-34
Author(s):  
Nguyen Manh Thang ◽  
Tran Thi Luong

Abstract—Almost developed applications tend to become as accessible as possible to the user on the Internet. Different applications often store their data in cyberspace for more effective work and entertainment, such as Google Docs, emails, cloud storage, maps, weather, news,... Attacks on Web resources most often occur at the application level, in the form of HTTP/HTTPS-requests to the site, where traditional firewalls have limited capabilities for analysis and detection attacks. To protect Web resources from attacks at the application level, there are special tools - Web Application Firewall (WAF). This article presents an anomaly detection algorithm, and how it works in the open-source web application firewall ModSecurity, which uses machine learning methods with 8 suggested features to detect attacks on web applications. Tóm tắt—Hầu hết các ứng dụng được phát triển có xu hướng trở nên dễ tiếp cận nhất có thể đối với người dùng qua Internet. Các ứng dụng khác nhau thường lưu trữ dữ liệu trên không gian mạng để làm việc và giải trí hiệu quả hơn, chẳng hạn như Google Docs, email, lưu trữ đám mây, bản đồ, thời tiết, tin tức,... Các cuộc tấn công vào tài nguyên Web thường xảy ra nhất ở tầng ứng dụng, dưới dạng các yêu cầu HTTP/HTTPS đến trang web, nơi tường lửa truyền thống có khả năng hạn chế trong việc phân tích và phát hiện các cuộc tấn công. Để bảo vệ tài nguyên Web khỏi các cuộc tấn công ở tầng ứng dụng, xuất hiện các công cụ đặc biệt - Tường lửa Ứng dụng Web (WAF). Bài viết này trình bày thuật toán phát hiện bất thường và cách thức hoạt động của tường lửa ứng dụng web mã nguồn mở ModSecurity khi sử dụng phương pháp học máy với 8 đặc trưng được đề xuất để phát hiện các cuộc tấn công vào các ứng dụng web.


2021 ◽  
Author(s):  
Vasily V. Grinev ◽  
Mikalai M. Yatskou ◽  
Victor V. Skakun ◽  
Maryna K. Chepeleva ◽  
Petr V. Nazarov

AbstractMotivationModern methods of whole transcriptome sequencing accurately recover nucleotide sequences of RNA molecules present in cells and allow for determining their quantitative abundances. The coding potential of such molecules can be estimated using open reading frames (ORF) finding algorithms, implemented in a number of software packages. However, these algorithms show somewhat limited accuracy, are intended for single-molecule analysis and do not allow selecting proper ORFs in the case of long mRNAs containing multiple ORF candidates.ResultsWe developed a computational approach, corresponding machine learning model and a package, dedicated to automatic identification of the ORFs in large sets of human mRNA molecules. It is based on vectorization of nucleotide sequences into features, followed by classification using a random forest. The predictive model was validated on sets of human mRNA molecules from the NCBI RefSeq and Ensembl databases and demonstrated almost 95% accuracy in detecting true ORFs. The developed methods and pre-trained classification model were implemented in a powerful ORFhunteR computational tool that performs an automatic identification of true ORFs among large set of human mRNA molecules.Availability and implementationThe developed open-source R package ORFhunteR is available for the community at GitHub repository (https://github.com/rfctbio-bsu/ORFhunteR), from Bioconductor (https://bioconductor.org/packages/devel/bioc/html/ORFhunteR.html) and as a web application (http://orfhunter.bsu.by).


Author(s):  
O. Mendoza-Cano ◽  
R. Aquino-Santos ◽  
J. López-de la Cruz ◽  
R. M. Edwards ◽  
A. Khouakhi ◽  
...  

Abstract Urban flooding is one of the major issues in many parts of the world, and its management is often challenging. One of the challenges highlighted by the hydrology and related communities is the need for more open data and monitoring of floods in space and time. In this paper, we present the development phases and experiments of an Internet of Things (IoT)-based wireless sensor network for hydrometeorological data collection and flood monitoring for the urban area of Colima-Villa de Álvarez in Mexico. The network is designed to collect fluvial water level, soil moisture and weather parameters that are transferred to the server and to a web application in real-time using IoT Message Queuing Telemetry Transport protocol over 3G and Wi-Fi networks. The network is tested during three different events of tropical storms that occurred over the area of Colima during the 2019 tropical cyclones season. The results show the ability of the smart water network to collect real-time hydrometeorological information during extreme events associated with tropical storms. The technology used for data transmission and acquisition made it possible to collect information at critical times for the city. Additionally, the data collected provided essential information for implementing and calibrating hydrological models and hydraulic models to generate flood inundation maps and identify critical infrastructure.


Sign in / Sign up

Export Citation Format

Share Document