oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Similar Document Search and Recommendation  [cached]
Vidhya Govindaraju,Krishnan Ramanathan
Journal of Emerging Technologies in Web Intelligence , 2012, DOI: 10.4304/jetwi.4.1.84-93
Abstract: Query formulation is one of the most difficult aspects of search, especially for a novice user. We propose a new search interaction where the user searches with a reference document and the system learns from the user inputs over a period of time to “push” relevant and new content without additional user interaction. Our method is based on identifying key phrases from the input document. The key phrases are used to query a search engine and the results are evaluated for similarity to the original document. By caching documents received from a user over a period of time, a user profile is built. The profile is then used to provide recommendations to the user. Evaluations show that this method has a good precision in finding documents of interest to the user. Also our key phrase extraction method has good recall in retrieving the input document. Additional experiments reveal that our recommendation system is of help in exploring documents of interest to the user.
Multi-Document Summarization via Discriminative Summary Reranking  [PDF]
Xiaojun Wan,Ziqiang Cao,Furu Wei,Sujian Li,Ming Zhou
Computer Science , 2015,
Abstract: Existing multi-document summarization systems usually rely on a specific summarization model (i.e., a summarization method with a specific parameter setting) to extract summaries for different document sets with different topics. However, according to our quantitative analysis, none of the existing summarization models can always produce high-quality summaries for different document sets, and even a summarization model with good overall performance may produce low-quality summaries for some document sets. On the contrary, a baseline summarization model may produce high-quality summaries for some document sets. Based on the above observations, we treat the summaries produced by different summarization models as candidate summaries, and then explore discriminative reranking techniques to identify high-quality summaries from the candidates for difference document sets. We propose to extract a set of candidate summaries for each document set based on an ILP framework, and then leverage Ranking SVM for summary reranking. Various useful features have been developed for the reranking process, including word-level features, sentence-level features and summary-level features. Evaluation results on the benchmark DUC datasets validate the efficacy and robustness of our proposed approach.
A Secure Web-Based File Exchange Server: Software Requirements Specification Document  [PDF]
Serguei A. Mokhov,Marc-André Laverdière,Ali Benssam,Djamel Benredjem
Computer Science , 2011,
Abstract: This document presents brief software specification of a secure file exchange system prototype involving mutual authentication of the users via their browser and the application server with PKI-based certificates as credentials, the use of LDAP for credential management, and authentication between the application and database servers to maintain a high level of trust between all parties.
Design of Secure E-mail System for PDF Document
面向PDF文档的安全电子邮件系统

GUO Wen-qiang,ZHAO Yu-zhang,HAN Li-ying,
郭文强
,赵玉章,韩莉英

计算机应用研究 , 2007,
Abstract: A secure E-mail system for PDF document which use modern information security technology,data encryption and network security is proposed.The main idea is to use request-response mechanism between client and server to provide information security service for terminal users,the application technology of secure E-mail include releasing,exploring and sear-ching encrypted data etc.The system has already been implemented in a Windows platform which is established for enterprise application and take a good effect in practice.
An Approach to Secure Authentication Protocol with Group Signature based Quantum Cryptography  [PDF]
V. Padmavathi,,M. Madhavi,N. Nagalakshmi
International Journal of Innovative Technology and Exploring Engineering , 2013,
Abstract: This paper proposes a secure authentication protocol in a new direction with group signature based Quantum cryptography for a networked organization. The group signature setting has a group with copious members and one manager. The proposed protocol uses a trusted centre TC generates a large heap of public/private key pairs. Every member of the group has a different list of unique private keys which is distributed by TC to sign a document. The keys are immunable using quantum key distribution protocol which acquires the properties of quantum mechanics.
Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)  [PDF]
Dorai Ashok Shanmugavel Anbalagan
Computer Science , 2015,
Abstract: Secure Shell (SSH) protocol requires all implementations to support public key authentication method ("publickey") for authentication purposes, so web applications which provide a SSH client over the web browser need to support "publickey". However, restrictions in Hypertext Transfer Protocol (HTTP), such as same origin policy, and limited access to local resources, make it difficult to perform such authentications. In this document, a system to perform "publickey" authentication over HTTP is provided. It is ensured that no compromise is made that would pose a security risk to SSH protocol.
PROVIDE SECURE AUTHENTICITY FOR PROPAGATING INFORMATION
V.Sathya Preiya , 2 S.Sathish Kumar, 3M.Shanmuganathan
International Journal of Engineering Trends and Technology , 2011,
Abstract: The data transfers using internet via EMail is rapidly growing. So many business people and individuals using internet to transfer the documents (e.g., letters, certificates etc.). Security is an important issue while transferring data using E-mail because any unauthorized person can hack the data. Consider a method for preventing E-fraud in which the document is scanned and generating an image which is formatted as JPEG or PDF file. The image (scanned document) is converting in to ciphertext using asymmetric encryption algorithm. The encrypted information is then hiding in to a host image using steganography. In steganography use Least Significant Bit algorithm to hide the ciphertext in to a host image, this image is called as stegoimage. The stegoimage is sent as an attachment to destination through email using Simple Mail Transfer protocol. It provides higher security to protect the data from hackers. Then download the stegoimage from the email, using steganography to extract the ciphertext from the host image. Decryption is ccompanished by convert the ciphertext in to image (scanned document). In this project focus the secure authentication of E-document (eg. letters, certificates) that are communicated over the internet.
From "Identical" to "Similar": Fusing Retrieved Lists Based on Inter-Document Similarities  [PDF]
Anna Khudyak Kozorovitsky,Oren Kurland
Computer Science , 2014, DOI: 10.1613/jair.3214
Abstract: Methods for fusing document lists that were retrieved in response to a query often utilize the retrieval scores and/or ranks of documents in the lists. We present a novel fusion approach that is based on using, in addition, information induced from inter-document similarities. Specifically, our methods let similar documents from different lists provide relevance-status support to each other. We use a graph-based method to model relevance-status propagation between documents. The propagation is governed by inter-document-similarities and by retrieval scores of documents in the lists. Empirical evaluation demonstrates the effectiveness of our methods in fusing TREC runs. The performance of our most effective methods transcends that of effective fusion methods that utilize only retrieval scores or ranks.
Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document  [PDF]
Serguei A. Mokhov,Marc-André Laverdière,Ali Benssam,Djamel Benredjem
Computer Science , 2011,
Abstract: We report on the software engineering design and implementation of an web- and LDAP-based secure file exchange system with bi-directional authentication of all parties involved in the process that is the user's browsers and the application server mutually authenticate, and the application and database servers authenticate using certificates, credentials, etcs. with the directory service provided by LDAP using open-source technologies.
Secure Image Authentication of a Grayscale Document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capability  [PDF]
Mrs. S Kavitha Murugesan,,Mr. Shanavas K A
International Journal of Innovative Technology and Exploring Engineering , 2013,
Abstract: In this paper we proposes a new authentication method which is based on secret sharing technique and logistic map with repairing capability of data, via the use of the Portable Network Graphics image. In this approach each block of a grayscale document image generate an authentication signal, which combine with binarized block content, is transformed into several shares using Shamir secret sharing scheme. The shares generated from the binarized block contents are then embedded into an alpha channel plane. The original grayscale image combine with alpha channel plane to form a PNG image; this PNG image encrypted by using chaotic logistic map to form a stego image. Stego image received in the receiver side is decrypt and checks the authentication. If the authentication process fails then repairing is done in each tampered block, after collecting two shares from unmarked block using reverse Shamir scheme. Security of data provided by sharing of data in the alpha channel and encrypting the stego image.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.