filter rules
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 9)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Vol 2096 (1) ◽  
pp. 012040
Author(s):  
V Kh Fedorov ◽  
E G Balenko ◽  
E V Vershennik ◽  
P V Zakalkin

Abstract Cyberspace, a global artificial space, has emerged and become part of all human activities, which exposes communication network elements, in particular service servers, to attacks, whether from individual hackers and cyberterrorists or from organized communities. Denial-of-service or DDoS attacks are the most common type. These are intended solely to cause a denial of service in various information systems, including service servers. This paper presents a method that can improve protection of servers that provide various resources (services) by reasonable management of filter rules and IP address lists.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hesham I. AlMujamed

Purpose The purpose of this research was to examine the effectiveness of filter rules and investigate the weak form of the efficient market hypothesis (EMH) on sample shares of shariah-compliant vs. conventional banks listed on the Gulf Cooperation Council (GCC) stock market. Design/methodology/approach Nine trading filter strategies with different statistical analyses were used as defined in the literature (Fifield et al., 2005; Almujamed et al., 2018). Daily closing equity prices of a sample of twenty shariah-compliant banks and twenty conventional banks were recorded over the 18-year period ending 31 December 2017. Findings Shares of shariah-compliant banks in the GCC were not weak-form efficient since trading based on past information was predictable, profitable and outperformed the corresponding naïve buy-and-hold trading strategy. Shares of conventional GCC banks underperformed Research limitations/implications This paper’s findings should be useful for central banks and capital market authorities in GCC countries for evaluation when considering new regulations or process changes. Limitations include small sample numbers and need for more recent evaluations of accounting disclosure levels. A wider range of data, statistical analyses and other trading strategies is needed. Potential investors (Muslim and non-Muslim), shariah supervisory boards, and preparers of financial statements can benefit from this study. Practical implications The results suggest that selection of trading strategy affects the success of the rule and that mid-sized filters are the best. Originality/value This is an innovative study comparing performance of shariah-compliant and conventional banks under different filter rules.


Techno Com ◽  
2021 ◽  
Vol 20 (1) ◽  
pp. 134-146
Author(s):  
Rahmat Novrianda Dasmen ◽  
Akhmad Khudri
Keyword(s):  

PT. TASPEN merupakan BUMN yang menyelenggarakan dua jenis program utama, yaitu Program Tabungan Hari Tua dan Program Pensiun PNS. PT. TASPEN ini tentunya memiliki jaringan wireless, tetapi memiliki beberapa kekurangan ataupun permasalahan sehingga mengganggu kualitas jaringan wireless PT. TASPEN. Adapun permasalahan yang terjadi adalah kecepatan internet menjadi sangat lambat karena user yang bukan karyawan pun sangat mudah terhubung ke jaringan wireless PT. TASPEN. Hal ini dikarenakan belum adanya pengamanan seperti user dan password khusus untuk penggunaan jaringan wireless PT. TASPEN. Selain itu, beberapa karyawan juga terkadang menggunakan jaringan wireless PT. TASPEN untuk membuka media sosial sehingga menimbulkan overload penggunaan bandwidth PT. TASPEN. Oleh karena itu, pada penelitian dengan menggunakan Metode Action Research ini, peneliti menerapkan RADIUS Server untuk mendata user khususnya karyawan PT. TASPEN serta memberikan hak akses (user dan password) yang berbeda-beda untuk setiap karyawan. Selain itu, peneliti juga memanfaatkan Firewall Filter Rules untuk memblok media sosial bagi user yang terhubung ke jaringan wireless agar kualitas kecepatan internet pada PT. TASPEN.


2020 ◽  
Vol 2020 (2) ◽  
pp. 45-66
Author(s):  
Anastasia Shuba ◽  
Athina Markopoulou

AbstractToday’s mobile apps employ third-party advertising and tracking (A&T) libraries, which may pose a threat to privacy. State-of-the-art detects and blocks outgoing A&T HTTP/S requests by using manually curated filter lists (e.g. EasyList), and recently, using machine learning approaches. The major bottleneck of both filter lists and classifiers is that they rely on experts and the community to inspect traffic and manually create filter list rules that can then be used to block traffic or label ground truth datasets. We propose NoMoATS – a system that removes this bottleneck by reducing the daunting task of manually creating filter rules, to the much easier and scalable task of labeling A&T libraries. Our system leverages stack trace analysis to automatically label which network requests are generated by A&T libraries. Using NoMoATS, we collect and label a new mobile traffic dataset. We use this dataset to train decision tree classifiers, which can be applied in real-time on the mobile device and achieve an average F-score of 93%. We show that both our automatic labeling and our classifiers discover thousands of requests destined to hundreds of different hosts, previously undetected by popular filter lists. To the best of our knowledge, our system is the first to (1) automatically label which mobile network requests are engaged in A&T, while requiring to only manually label libraries to their purpose and (2) apply on-device machine learning classifiers that operate at the granularity of URLs, can inspect connections across all apps, and detect not only ads, but also tracking.


2020 ◽  
Vol 9 (2) ◽  
pp. 80
Author(s):  
Lin Zhu ◽  
Nan Li ◽  
Luyi Bai

In the context of the Semantic Web, the Resource Description Framework (RDF), a language proposed by W3C, has been used for conceptual description, data modeling, and data querying. The algebraic approach has been proven to be an effective way to process queries, and algebraic operations in RDF have been investigated extensively. However, the study of spatiotemporal RDF algebra has just started and still needs further attention. This paper aims to explore an algebraic operational framework to represent the content of spatiotemporal data and support RDF graphs. To accomplish our study, we defined a spatiotemporal data model based on RDF. On this basis, the spatiotemporal semantics and the spatiotemporal algebraic operations were investigated. We defined five types of graph algebras, and, in particular, the filter operation can filter the spatiotemporal graphs using a graph pattern. Besides this, we put forward a spatiotemporal RDF syntax specification to help users browse, query, and reason with spatiotemporal RDF graphs. The syntax specification illustrates the filter rules, which contribute to capturing the spatiotemporal RDF semantics and provide a number of advanced functions for building data queries.


2019 ◽  
Vol 2 (1) ◽  
pp. 78
Author(s):  
Muhammad Husnaini ◽  
Wire Bagye ◽  
Maulana Ashari
Keyword(s):  

Pengguna Internet Guru dan siswa di SMKN 1 Narmada, 75 - 85 % mengakses internet untuk sosial media, mendownload game, menonton video, menyelesaikan tugas dari guru mata pelajaran. Hasil  observasi dan wawancara di SMKN 1 Narmada  menunjukan bahwa situs yang sering diakses khususnya oleh siswa SMKN 1 Narmada adalah situs di luar konten pembelajaran, seperti Facebook, Youtube dan beberapa situs game.                 Untuk memaksimalkan penggunaan internet bagi siswa untuk mengakses pelajaran maka perlu dilakukan majamen jaringan guna membatasi akses siswa pada situs tertentu. Konfigurasi jaringan baru dilakukan dengan mengimplementasikan sebuah fitur Layer 7 Protocols yang terdapat pada mikrotik RB750 pada feature Filter rules, access list. Peneliti menerapkan metode NDLC dalam pengmbangan sistem jaringan, disain sistem jaringan yang ada kemudian menambahkan router RB750 dan aksespotint sebagai media akses menggunakan wi-fi. Hasil  Implementasi Proxy Server dengan Fitur Layer 7 Protocols Mikrotik RB750  di SMKN 1 Narmada  terbukti mampu melakukan bloking terhadap situs-situs yang diinginkan seperti facebook, youtube dan game online salah satunya game mobilelegends serta situs – situs lain yang menggunakan protocol https. Disamping itu juga penerapan proxy ini tidak mempengaruhi kecepatan atau bandwidth dari koneksi internet yang ada di SMKN 1 Narmada.


Author(s):  
К. С. Дєєв

Develop  a  mathematical  model  of  an  abstract  network  packet  filter  with  the  ability  to classify Peer-to-Peer interactions. Used  methods  of  mathematical  modeling,  simulation  modeling  for  the  method  of group method of data handling and methods of mathematical statistics. Verification of effectiveness of the proposed models and methods is performed by comparing various metrics of the classifier of peer-to-peer interaction.  The  combination  of  different  approaches  in  the  synthesis  of  network  filter  rules  allows  us  to abstract  from the  transport layer  protocols, the  rules  are  described  as  a binary  tree that is  searched for peer-to-peer interaction properties.


Author(s):  
Hesham I. Almujamed

Purpose The purpose of this paper is to examine the predictability of nine filter rules and test the validity of the weak form of the efficient market hypothesis for the Qatar Stock Exchange (QSE). Design/methodology/approach This study adopts the filter rule strategy employed by Fifield et al. (2005), which suggests that a buy signal occurs when a share’s price increases by X percent from the previous price. This strategy recommends that the share is held until its price declines by X percent from the subsequent high price. Any price changes below X percent are ignored. Additionally, using the theory of weak-form efficiency, this paper suggests that, if a stock market is efficient, an investor cannot achieve superior results by using these trading rules. However, if market inefficiencies are present, profitable opportunities may arise. To this end, the daily closing share prices of 44 companies listed on QSE are explored for 2004–2017. Findings The findings propose that QSE is not weak-form efficient because security prices are predictable. As such, investors who followed filter strategies based on past price information could have made profit. Sectoral analysis findings further suggest that firms in the consumer goods and services, industrial and insurance sectors are most efficiently priced amongst the QSE-traded companies. Practical implications The evidence may be plausibly helpful as supporting market participants and academics that suggest that selecting filter strategy is extremely important for determining the overall profitability of the trading strategy. Originality/value To the best of my knowledge, this is the first study on Qatar that examines the performance of filter rules relative to a passive investor in the context of trading rules with individual share prices for a new stock market. Furthermore, this study adds to the literature through the empirical finding that technical analysts using filter strategies could generate excess returns relative to the buy-and-hold strategy on new emerging stock markets. This study also suggests the levels of transparency and accounting disclosure are limited, which may help Qatari policy makers understand the QSE context. Therefore, it might lead them to introduce regulatory changes to improve the QSE’s efficiency level.


2018 ◽  
Vol 17 (1) ◽  
pp. 1-28 ◽  
Author(s):  
Hesham I. Almujamed ◽  
Suzanne G. M. Fifield ◽  
David M. Power

This article investigates the weak form of the efficient market hypothesis (EMH) for the Kuwait Stock Exchange (KSE). In particular, it tests whether share returns on the KSE exhibit patterns which may be used to predict future share price changes. Ten filter rules are tested on weekly data for 42 firms over the period 1998–2011. The results suggest that the KSE was not weak-form efficient because patterns and trends were present in security prices. In addition, the results are consistent with the substantive literature which has argued that emerging stock markets are informationally inefficient, such as Fifield, Power and Sinclair (2005, 2008) and Xu (2010) and particularly those early studies of Al-Shamali (1989) and Al-Loughani and Moosa (1999) that looked at trading rules for the KSE.


Sign in / Sign up

Export Citation Format

Share Document