Filters








172,748 Hits in 4.5 sec

A NEW PARADIGM OF SECURITY MODEL FOR TREASURY INFORMATION SYSTEM -- E-GOVERNANCE

RAMINENI SIVARAMA PRASAD, GURRAM VEERA RAGHAVAIAH
2019 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY  
This paper analyses about new secured model developed for Treasury Information System by using Quantum Key Distribution based verifiable and traceable cipher text attributes based encryption (QKD-VTCP  ...  The world of Computing has been completing 80 years in applying scientific methodologies to understand basic principles of Emerging Technologies.  ...  , verifiability and huge attribute universe.  ... 
doi:10.34218/ijcet.10.2.2019.018 fatcat:avx6qaxxzzh4vgqbhoxwktyrqm

Severity Assessment of Software Defect Reports using Text Classification

Ruchika Malhotra, Nidhi Kapoor, Rishabh Jain, Sahaj Biyani
2013 International Journal of Computer Applications  
In this paper, we use text classification techniques to predict and assess the severity of defects. The results are based on defect description of issue requirements obtained from NASA project.  ...  Defect severity assessment is essential in order to allocate testing resources and effectively plan testing activities.  ...  For example, despite being different in context of usage, both news and new return new after stemming [5] .  ... 
doi:10.5120/14492-2622 fatcat:gvg3ctsnlndv3a2xvpnv7vqwr4

DMOSS: Open source software documentation assessment

Nuno Carvalho, Alberto Simões, José Almeida
2014 Computer Science and Information Systems  
The toolkit handles a package as an attribute tree, and performs several tree traverse algorithms through a set of plugins, specialized in retrieving specific metrics from text, gathering information about  ...  DMOSS 3 is a toolkit designed to systematically assess the quality of non source code content found in software packages.  ...  This work is funded by ERDF -European Regional Development Fund through the COMPETE Programme (operational programme for competitiveness) and by National Funds through the FCT -Fundaçao para a Ciencia  ... 
doi:10.2298/csis131005027c fatcat:l7lkjbomarcqfhpjd2lcjrx6n4

A Survey on Access Control in Semi-Trusted Cloud Environment

E. Karthik
2019 International Journal for Research in Applied Science and Engineering Technology  
Another scheme namely Multi-message Cipher-text Policy Attribute-Based Encryption (MCP-ABE) technique has been proposed in light for sharing scalable media.  ...  But a single data owner cannot manage all the tedious work loads separately, as it results in single-point of performance bottleneck.  ...  In this paper [3] , the author proposed that the data access control in public cloud storage systems was traditionally secured by a scheme called Cipher text-Policy Attribute-Based Encryption (CP-ABE)  ... 
doi:10.22214/ijraset.2019.3049 fatcat:u24nqtjql5dpzhufwto2sh2r5a

Assessment on Stylometry for Multilingual Manuscript

Sushil Kumar
2012 IOSR Journal of Engineering  
applicable in cyber crime, detective agencies etc. etc. have called upon the expertise of linguists in cases of disputed authorship.  ...  Experiments demonstrate that author profiles generated with initial bi-gram and initial tri-gram are effective in verifying texts authors.  ...  INTRODUCTION In the typical authorship attribution problem, a text of unknown authorship is assigned to one author, given a set of authors for whom text samples of undisputed authorship are available.  ... 
doi:10.9790/3021-02910106 fatcat:sqv4xeinmze2rakogq4bjbgjwe

An Attribtue-Based Statistic Model for Privacy Impact Assessment

Yong Wang, Jun Liu
2016 2016 International Conference on Collaboration Technologies and Systems (CTS)  
PII is often the target of attacks, and loss of PII could result in identity theft.  ...  Personally Identifiable Information (PII) includes any information that can be used to distinguish or trace an individual's identity such as name, social security number, date and place of birth, mother's  ...  The correlation knowledge base will be further expanded using the new correlations discovered in text mining and machine learning.  ... 
doi:10.1109/cts.2016.0117 dblp:conf/cts/WangL16 fatcat:i6btuwjhtng53aygt2hcydrvrm

Secure Authentication and Access System for Cloud Computing Auditing Services Using Associated Digital Certificate

R. Manjusha, R. Ramachandran
2015 Indian Journal of Science and Technology  
In the proposed mechanism data is encrypted under the set of user attributes and privilege access rights.  ...  In this paper, we proposed a new framework to enhance secure data storage, fine grained access and preserve data from unknown users or intruders in enterprise cloud.  ...  Step 3: The new secret key is created based on the new attributes given by the user during registration to the data owner. The TTP verifies the attributes before delegating the new key.  ... 
doi:10.17485/ijst/2015/v8is7/71223 fatcat:gemclby6knd6xctuif4rfqrjrq

Secure Authentication and Access System for Cloud Computing Auditing Services Using Associated Digital Certificate

R. Manjusha, R. Ramachandran
2015 Indian Journal of Science and Technology  
In the proposed mechanism data is encrypted under the set of user attributes and privilege access rights.  ...  In this paper, we proposed a new framework to enhance secure data storage, fine grained access and preserve data from unknown users or intruders in enterprise cloud.  ...  Step 3: The new secret key is created based on the new attributes given by the user during registration to the data owner. The TTP verifies the attributes before delegating the new key.  ... 
doi:10.17485/ijst/2015/v8is7/65321 fatcat:m4ighyhwqzfurkzku7lyozbsui

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [article]

Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015 arXiv   pre-print
of the indexing system to assess if the request is eligible and lawful.  ...  We propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner.  ...  The outcome of this algorithm is the relation between the user attributes, her name in particular, and the context of the text.  ... 
arXiv:1506.06033v1 fatcat:oilhjaohofd73gn7d6265wfuty

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [chapter]

Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015 Lecture Notes in Computer Science  
by employees of the indexing system to assess if the request to remove those links is eligible and lawful.  ...  In this work, we propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner.  ...  The outcome of this algorithm is the relation between the user attributes, her name in particular, and the context of the text.  ... 
doi:10.1007/978-3-319-28166-7_21 fatcat:rhefykeqmrgjfaje7ufxtfimti

An Experimental Study on Attribute Validity of Code Quality Evaluation Model

2022 Tehnički Vjesnik  
This also provides a direction for the optimization of the quality model and the use of quality assessment in different situations.  ...  dimensions, the performance of the text feature in the four machine learning algorithms overtakes the quality attributes; but when the peak is reached, quality attributes are more stable.  ...  Acknowledgment This paper is supported by Guangxi Key Laboratory of Cryptography and Information Security(No.GCIS202103).  ... 
doi:10.17559/tv-20211029115834 fatcat:xj6n5pzpqvayncgkopryidcji4

Large Scale Authorship Attribution of Online Reviews [chapter]

Prasha Shrestha, Arjun Mukherjee, Thamar Solorio
2018 Lecture Notes in Computer Science  
Traditional authorship attribution methods focus on the scenario of a limited number of authors writing long pieces of text.  ...  We propose that our approach can be used to slow down or deter the number of deceptive reviews in the wild.  ...  We have presented a method to perform authorship attribution on reviews in a large scale. We proposed to use individual author verifiers to solve the AA problem on a large number of authors.  ... 
doi:10.1007/978-3-319-75487-1_17 fatcat:szs7e3vp45gi7glvvmqz6ofhqi

Intelligent jurisprudence research

Rosina Weber
1999 Proceedings of the seventh international conference on Artificial intelligence and law - ICAIL '99  
In the process of remembering a similar situation when faced to a new one, Case-Based Reasoning (CBR) systems simulate analogical reasoning.  ...  When humans perform jurisprudence research, they employ analogical reasoning in comparing a given actual situation with past decisions, noting the affinities between them.  ...  Situation assessment methods infer values to assign the attributes in the formlike representation, modeling the new legal situation in the same fashion as cases in the case base.  ... 
doi:10.1145/323706.323791 fatcat:xmrnxacjpvec3iamqtlba3enba

Using Big Data Experiments in Cognitive and Linguo-Cultural Research in English and Russian

Olga A. Suleimanova, Inna M. Petrova
2020 Journal of Siberian Federal University  
The authors try to experimentally verify the hypothesis relating to the word order in the attributive group of the kind healthy nourishing food vs nourishing healthy food using Google and Yandex and, in  ...  The empirical results obtained via Google and Yandex help to verify this hypothesis and identify cognitive grounds for choosing the order of attributes.  ...  The study reveals the potential of using search engines both as the source of reliable data and as the experimental tool that allows to verify the hypothesis explaining WO in the attributive phrase in  ... 
doi:10.17516/1997-1370-0561 fatcat:gsogync3crbtzm4ihwg6pny5oa

Check Mate: Prioritizing User Generated Multi-Media Content for Fact-Checking [article]

Tarunima Prabhakar, Anushree Gupta, Kruttika Nadig, Denny George
2021 arXiv   pre-print
The data is accessible on Zenodo (https://zenodo.org/record/4032629) under Creative Commons Attribution License (CC BY 4.0).  ...  In addition, we also provide metadata for each post such as number of shares and likes of the post on ShareChat, a popular Indian social media platform, that allows for correlative analysis around virality  ...  Swair Shah for their continuous feedback in creation of this dataset.  ... 
arXiv:2010.13387v2 fatcat:czyw3yd3p5eyxnnwcpv7bczbfu
« Previous Showing results 1 — 15 out of 172,748 results