scholarly journals The Optimization Analysis of Phishing Email Filtering in Network Fraud based on Improved Bayesian Algorithm

Author(s):  
Yahao Zhang ◽  
Jin Pang ◽  
Hongshan Yin

Mail transmission was not only the main function of information system, but also the main way of network virus and Trojan horse transmission, which has a key impact on the running state of information. In order to deal with the threats of network viruses and Trojans and improve the level of e-mail management, this paper studies the filtering of information system, and proposes a phishing e-mail filtering method based on Improved Bayesian model. MATLAB simulation results show that the consistency p between the amount of data sent by e-mail and the amount received is good, the consistency rate reached 92.3%. the data security level is 95%, encryption proportion / data proportion ratio under Bayesian optimization are higher than those of unfiltered method,which up to 97.2%. Therefore, the Bayesian optimization model constructed in this paper can meet the needs of phishing email filtering in information communication at this stage.

2013 ◽  
Vol 380-384 ◽  
pp. 4667-4670
Author(s):  
Meng Jie Wang

This paper analyzes the status quo of Chinese Universities logistics management information system; using the Struts framework based on J2EE university logistics management information system, and the basic structure of the system, the main features integral part of, the main function analysis; combination of university logistics management the actual analysis of the information system client Web layer, business layer, data layer is designed to build stability, flexibility and scalability, easy maintenance of university logistics management information system, and enhance the logistical support capabilities, strengthening the logistics market management, improve work efficiency.


2021 ◽  
Vol 15 (4) ◽  
pp. 37-47
Author(s):  
Jamilatus Sadiah ◽  
Indaryono Indaryono ◽  
Arif Maulana Yusuf

The payroll system is an important function that is the responsibility of Human Resources Management. Its main function is to provide compensation to employees in the form of salary in exchange for their contribution to the organization / agency. Payroll is one of the processes in an organization that is vulnerable to problems. Slow data processing can result in slow presentation of slow report making so that it is also possible to delay payment of salaries to employees. Plus if something goes wrong making salary calculations inaccurate. This makes the payroll system needs to be supported by a good information system. The research methodology used by the author in this research is the System Development Life Sycle (SDLC) Waterfall method. The development of research methodology has several sequential stages, namely: planning (modeling), modeling (modeling), construction (construction), and the delivery of the system to the customers / users (deployment). Based on the problems found, The author proposes to PT Bank Perkreditan Rakyat (BPR) Sanggabuana Agung Karawang to use VB.Net, it is expected that with the proposed system can improve Payroll problems that occur at PT Bank Perkreditan Rakyat (BPR) Sanggabuana Agung. Based on this research, the existence of a computerized employee payroll calculation system is expected to become a system that is useful for the development of the company in the future, and it is hoped that it can fix the problem and can also facilitate the calculation of payroll.  Keywords : Accountimg Information System, Payroll, VB.Net Programming


Author(s):  
Sophie Gastellier-Prevost

Within a more and more complex environment, where connectivity, reactivity and availability are mandatory, companies must be “electronically accessible and visible” (i.e., connection to the Web, e-mail exchanges, data sharing with partners, etc.). As such, companies have to protect their network and, given the broad range of security solutions on the IT security market, the only efficient way for them is to design a global secured architecture. After giving the reader all the necessary materials and explaining classical security and services needs, this chapter proposes three different realistic security-level architectures that may be currently deployed within companies. For more realistic analysis and illustration, two examples of companies with different size and profile are given. A number of advices, explanations and guidelines are provided in this chapter so readers are able to adapt those architectures to their own companies and both security and network needs.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Lixia Xie ◽  
Liping Yan ◽  
Xugao Zhang ◽  
Hongyu Yang

The accuracy of the existing security situation assessment model of information system for smart mobile devices is affected by expert evaluation preferences. This paper proposes an information system security situation assessment model for smart mobile devices, which is based on the modified interval matrix-entropy weight-based cloud (MIMEC). According to the security situation assessment index system, the interval judgment matrix reflecting the relative importance of different indexes is modified to improve the objectivity of the index layer weight vector. Then, the entropy weight-based cloud is used to quantify the criterion layer and the target layer security situation index, and the security level of the system is graded. The evaluation experiment on the departure control system for smart mobile devices not only verify the validity of this model but also demonstrate that this model has higher stability and reliability than other models.


Energies ◽  
2019 ◽  
Vol 12 (15) ◽  
pp. 2926 ◽  
Author(s):  
Mahmoud Saleh ◽  
Yusef Esa ◽  
Mohamed El Hariri ◽  
Ahmed Mohamed

This paper provides an extensive review of the conducted research regarding various microgrids (MGs) control techniques and the impact of Information Communication Technology (ICT) degradation on MGs performance and control. Additionally, this paper sheds the light on the research gaps and challenges that are to be explored regarding ICT intrinsic-limitations impact on MGs operations and enhancing MGs control. Based on this assessment, it offers future prospects regarding the impact of ICT latencies on MGs and, consequently, on the smart grid. Finally, this paper introduces a case study to show the significance and examine the effect of wireless communication technologies latency on the converters and the DC bus voltage of a centralized controlled DC MG. A DC microgrid with its communication-based control scheme was modeled to achieve this goal. The MATLAB simulation results show that the latency impact may be severe on the converter switches and the DC bus voltage. Additionally, the results show that the latency impact varies depending on the design of the MG and its operational conditions before the latency occurs.


2018 ◽  
Vol 7 (3) ◽  
pp. 1024 ◽  
Author(s):  
Indu Maurya ◽  
S K Gupta

For hiding information in a digitalized object Steganography is an important technique. It is a special kind of scientific technique which involves the secret information communication inside suitable cover objects of multimedia like image files, audio or videos. The embedded data and its existence are hidden with the help of Steganography. It is a method of hiding data which has enormously improved the security level of confidential data with the help of special hiding mechanism and is considered as remarkable achievement in the computational power. The main aims of Steganography are; capacity of concealed data along with its robustness, lack of detection etc. These are some of the additional features which make it distinguishing from other older techniques like watermarking as well as cryptography. In this research paper, we have surveyed Steganography of digital images and cover the basic and key concepts. In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.For increasing Steganographic security, specifically used approaches are shortlisted and the developments made after investigations are also presented in this paper.  


2010 ◽  
Vol 07 (02) ◽  
pp. 129-143
Author(s):  
AININ SULAIMAN ◽  
NOOR ISMAWATI JAAFAR ◽  
ROHANA JANI

This paper focuses on examining the ICT diffusion by studying an initiative of the Malaysian government to bridge the digital divide that exists across the country's urban and rural communities. This is achieved through investigating the operation and the experience of a typical Rural Internet Centre. The findings of this study showed that there is keen interest among the community to learn and sharpen their ICT-related skills. The Internet Centre serves to provide an avenue for the realisation of this goal. The study showed that despite some operational snags, the Internet Centre performed well. One of the by-products of the centre was that its activities fostered closer relationships among users; it provided an avenue for disparate community members to interact and share their new skills. Bringing the ICT usage and appreciation to the rural areas was successful. About half of the centre users made weekly visits during which they searched for information on the internet, sent and received e-mail and attended the Internet Centre's regular IT classes. They also saw it as a valuable communication channel and a potential leveller of the technological capability gap.


Sign in / Sign up

Export Citation Format

Share Document