scholarly journals Design of Associate Content Based Classifier (ACBC) for Malicious URL Prediction by Rule Generation Algorithm

Author(s):  
Vivekanadam B

Recently, the internet is becoming as the most effective tool to interact with many foreign societies especially during COVID-19 pandemic. Moreover, the digital platform is increasing in many developing countries and at the same time, the chance of fraudulence is also increasing day by day. In the digital world, phishing assaults are emerging as the most common type of social engineering attack. Currently, many websites are targeting to acquire the confidential data, which is stored in websites. Recently, the classification techniques are employed to detect the phishing websites. Many tools are used for anti-phishing purposes; they are blacklist and antivirus software. The confidential data in a fake surrounding has intended the category of leaked data due to the action of attackers. In this scenario, machine learning method is observed as a very effective to classify the phishing and non-phishing web (Uniform Resource Locator) URLs. This classification struggles in classifying the leaked data content-based challenge. Therefore, the proposed algorithm is associated with the content-based classification method along with the rule-based generator algorithm. This research article integrates the content-based classification with a rule-based generator algorithm to improve the overall performance of the system. The updated public online repository called Mendeley dataset is used in the proposed research work. The proposed algorithm is used in 7k phishing and real websites content data for performing feature extraction. The extracted feature is then analyzed with our proposed algorithm to provide better prediction accuracy. Also, the proposed work has concluded that, the associate algorithm has achieved better accuracy, when compared to other existing methods.

2021 ◽  
Vol 9 (2) ◽  
pp. 1022-1030
Author(s):  
Shivakumar. C, Et. al.

In this Context-aware computing era, everything is being automated and because of this, smart system’s count been incrementing day by day.  The smart system is all about context awareness, which is a synergy with the objects in the system. The result of the interaction between the users and the sensors is nothing but the repository of the vast amount of context data. Now the challenging task is to represent, store, and retrieve context data. So, in this research work, we have provided solutions to context storage. Since the data generated from the sensor network is dynamic, we have represented data using Context dimension tree, stored the data in cloud-based ‘MongoDB’, which is a NoSQL. It provides dynamic schema and reasoning data using If-Then rules with RETE algorithm. The Novel research work is the integration of NoSQL cloud-based MongoDB, rule-based RETE algorithm and CLIPS tool architecture. This integration helps us to represent, store, retrieve and derive inferences from the context data efficiently..                       


Detection and reorganization of text may save a lot of time while reproducing old books text and its chapters. This is really challenging research topic as different books may have different font types and styles. The digital books and eBooks reading habit is increasing day by day and new documents are producing every day. So in order to boost the process the text reorganization using digital image processing techniques can be used. This research work is using hybrid algorithms and morphological algorithms. For sample we have taken an letter pad where the text and images are separated using algorithms. The another objective of this research is to increase the accuracy of recognized text and produce accurate results. This research worked on two different concepts, first is concept of Pixel-level thresholding processing and another one is Otsu Method thresholding.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Lev Krasnov ◽  
Ivan Khokhlov ◽  
Maxim V. Fedorov ◽  
Sergey Sosnin

AbstractWe developed a Transformer-based artificial neural approach to translate between SMILES and IUPAC chemical notations: Struct2IUPAC and IUPAC2Struct. The overall performance level of our model is comparable to the rule-based solutions. We proved that the accuracy and speed of computations as well as the robustness of the model allow to use it in production. Our showcase demonstrates that a neural-based solution can facilitate rapid development keeping the required level of accuracy. We believe that our findings will inspire other developers to reduce development costs by replacing complex rule-based solutions with neural-based ones.


2018 ◽  
Vol 12 (03) ◽  
pp. 1850007 ◽  
Author(s):  
J. P. Narayan ◽  
A. Kumar

The effects of ridge and valley on the characteristics of Rayleigh waves are presented in this paper. The research work carried out has been stimulated by the day by day increase of long-span structures in the hilly areas which are largely affected by the spatial variability in ground motion caused by the high-frequency Rayleigh waves. The Rayleigh wave responses of the considered triangular and elliptical ridge and valley models were computed using a fourth-order accurate staggered-grid viscoelastic P-SV wave finite-difference (FD) program. The simulated results revealed very large amplification of the horizontal component and de-amplification of the vertical component of Rayleigh wave at the top of a triangular ridge and de-amplification of both the components at the base of the triangular valley. The observed amplification of both the components of Rayleigh wave in front of elliptical valley was larger than triangular valley models. A splitting of the Rayleigh wave wavelet was inferred after interaction with ridge and valley. It is concluded that the large-scale topography acts as a natural insulator for the surface waves and the insulating capacity of the valley is more than that of a ridge. This insulation phenomenon is arising due to the reflection, diffraction and splitting of the surface wave while moving across the topography. It is concluded that insulating potential of the topography for the Rayleigh waves largely depends on their shape and shape-ratio.


2021 ◽  
pp. 231971452110220
Author(s):  
Badra Sandamali Galdolage

The value co-creation scholarly work has been criticized for neglecting the possible failures in the collaborative value creation process, which is termed as ‘value co-destruction’. Additionally, both the value co-creation and available limited research work in value co-destruction have overly attended on actor-to-actor interactions taking place in traditional service encounters, disregarding the practical movement towards the provision of services via technological platforms. Though there are ample studies that recognize factors influencing customer acceptance or rejections of technologies, a very limited number of studies have focused on exploring how and why customer collaboration with self-service technologies (SSTs) goes wrong due to the failures in the co-creation process. Therefore, this study attempts to understand how ‘value co-destruction’ takes place in the SSTs. Following a qualitative inquiry, using semi-structured interviews with 25 individuals, 15 reasons for co-destruction that vary among different customer demographics were found and classified into four integrative themes as ‘inabilities in co-learning’, ‘poor co-operation’, ‘problems with connecting’ and ‘poor corrective actions’. The findings fill the gap in the literature by addressing value co-destruction in technological interfaces, particularly in the SST context. Further, it will help practitioners to design and deliver value-enhancing self-service technological interfaces, resulting in none or minimum difficulties for customers.


2019 ◽  
Vol 9 (S1) ◽  
pp. 58-63
Author(s):  
S. Lakshmi ◽  
L. Santhi

Academic Libraries nowadays have to relate all its activities to public and its users very often and keep them updated with the changes and Updation in the Library. In order to attract the users and sustain in this modern ICT world, the user’s complete satisfaction is the ultimatum. We are in a digital world where one need not physically go to the Library or a computer to get information they want. Just a swipe on their smart phone and they have their required information in their finger tips. They just require a device to login and an internet or Wi-Fi connection. That’s it. This study is about the marketing of information products and services among users of M. Kumarasamy College of Engineering, Karur. From this research it is found that the marketing of services has been a great challenge with limited budget as well as the emerging ICT tools and technology day by day. The study shows the user behavior, their awareness level, usage, usefulness & the marketing strategies used in the College Library for promoting their services. This paper also suggests that Librarians have to be proactive in marketing their information sources & services with the help of current marketing strategies using ICT which is the need of the hour.


2017 ◽  
Vol 8 (2) ◽  
pp. 26-42 ◽  
Author(s):  
Md. Majharul Haque ◽  
Suraiya Pervin ◽  
Zerina Begum

The object of this research work is to replace pronoun by corresponding noun for Bangla news documents. To the best of our knowledge, this is the first initiative to solve the problem of dangling pronoun where corresponding noun is not available. If the information retrieval procedures extract any sentence with dangling pronoun, it may raise confusion to the user. To mitigate this problem, a method has been proposed here by using general and special tagging, dependency parsing, full name identifying and finally pronoun replacing. For achieving the target of this method, 3000 Bangla news documents have been analyzed and some grammar books have been studied. Seven knowledgeable persons in the arena of Bangla language also helped us in this research work. Finally, the proposed method shows 71.80% accuracy in the evaluation for replacing pronoun.


Author(s):  
Khuda Bux ◽  
Muhammad Yousaf ◽  
Akhtar Hussain Jalbani ◽  
Komal Batool

The number of client-side attacks is increasing day-by-day. These attacks are launched by using various methods like phishing, drive-by downloads, click-frauds, social engineering, scareware, and ransomware. To get more advantage with less exertion and time, the attackers are focus on the clients, rather than servers which are more secured as compared to the clients. This makes clients as an easy target for the attackers on the Internet. A number of systems/tools have been created by the security community with various functions for detection of client-side attacks. The discovery of malicious servers that launch the client side attacks can be characterized in two types. First to detect malicious servers with passive detection which is often signature based. Second to detect the malicious servers with active detection often with dynamic malware analysis. Current systems or tools have more focus on identifying malicious servers rather than preventing the clients from those malicious servers. In this paper, we have proposed a solution for the detection and prevention of malicious servers that use the Bro Intrusion Detection System (IDS) and VirusTotal API 2.0. The detected malicious link is then blocked at the gateway.


Author(s):  
Mrs. Maya Murali ◽  
Dr. Well Haorei

This research article is an extract of Ph.D. thesis research work. The present paper analyses the level of emotional intelligence and its impact on acceptance to technology implementation among the employees of primary cooperative credit societies in Idukki District. The study concluded that multiple regression analysis indicated independent variables, namely; social skills factor, social awareness factor, self-regulation factor, and self-awareness factor were highly significant in supplementing emotional intelligence among the bank employees in the study area. Further, from the analysis of Pearson’s correlation coefficient of emotional intelligence index and emotional intelligence factors, the study concludes that all the five emotional intelligence factors are statistically significant and has a positive correlation to emotional intelligence index. So, to increase the emotional intelligence level of the sample bank employees the higher authorities of the study banks should impart training in those five factors. KEY WORDS: Level of Emotional Intelligence and Impact, Employees, Idukki District


Author(s):  
Sathiyamoorthi V. ◽  
T. Nadana Ravishankar ◽  
Ilavarasi A. K. ◽  
Sridhar Udayakumar ◽  
Karthikeyan Harimoorthy ◽  
...  

Reviewing and buying the right goods from online websites is growing day by day in today's fast internet environment. Numerous goods in the same label are available to consumers. It is thus a difficult job for consumers to pick up the correct commodity at a decent price under different market conditions. Therefore, it is important for owners of online shopping websites to better understand their customers' needs and offer better services. For these reasons, the access log documented a vast amount of data related to user interactions with the websites. This access log therefore plays a key role in predicting user access trends and in recommending the best product to consumers. This research work therefore focuses on one such methodology for evaluating the pattern and behavioral analysis of users in e-commerce websites.


Sign in / Sign up

Export Citation Format

Share Document