نتایج جستجو برای: malicious web pages

تعداد نتایج: 255955  

Expert discovery is a quest in search of finding an answer to a question: “Who is the best expert of a specific subject in a particular domain within peculiar array of parameters?” Expert with domain knowledge in any field is crucial for consulting in industry, academia and scientific community. Aim of this study is to address the issues for expert-finding task in real-world community. Collabor...

Journal: :محیط زیست طبیعی 0
فریده عتابی استادیار دانشگاه آزاد اسلامی، واحد علوم و تحقیقات تهران، ایران یوسف رشیدی دکترای مهندسی شیمی، شرکت کنترل کیفیت هوا، شهرداری تهران، ایران علیرضا قراگوزلو استادیار دانشگاه آزاد اسلامی، واحد علوم و تحقیقات تهران، ایران آتنا عربی کارشناس ارشد مهندسی محیط زیست، واحد علوم و تحقیقات تهران، دانشگاه آزاد اسلامی، ایران

particulate and gaseous emissions of pollutants from industries and auto-exhausts are responsible for rising discomfort, aggravates respiratory and cardiovascular. in this study, a system for air quality information in tehran city has been developed, using an online web-based geographic information system. this web-based gis application allows users to recognize areas with a potential increase ...

Journal: :International Journal of Computer Applications 2015

2006
Bhuvan Bamba Ling Liu James Caverlee Mudhakar Srivatsa Aameek Singh

Link Based approaches are among the most popular ranking approaches employed by search engines. They make use of the inherent linkage based structure of World Wide Web documents assigning each document an importance score. This importance score is based on the incoming links for a document; a document which is pointed to by many high quality documents should have a higher importance score. Goog...

Journal: :International Journal on Web Service Computing 2015

Journal: :KIPS Transactions on Computer and Communication Systems 2013

2003
Tetsuya Suzuki Takehiro Tokuda

It is attractive to extract parts of Web pages for the following two purposes. One is to clip parts of Web pages as we clip articles of newspapers. Another is to utilize information on Web pages by software. In this paper we define operations to extract parts of Web pages, namely path set operations. The operations are for both clipping of parts of Web pages and information extraction from Web ...

Journal: :تحقیقات کتابداری و اطلاع رسانی دانشگاهی 0
حمیدرضا کیانی کارشناس ارشد علم اطلاعات و دانش شناسی، مسئول کتابخانۀ دانشکدۀ علوم دانشگاه شاهد الهام احمدی کارشناس ارشد علم اطلاعات و دانش شناسی، دانشگاه شهید چمران اسماعیل مصطفوی دانشجوی دکتری علم اطلاعات و دانش شناسی، دانشگاه تهران

purpose: the aim of present study was the comparative evaluation of content and support quality of iranian academic libraries websites’ and provide recommendations to improve them.methodology: this study is an applied research and methodology was comparative survey. data gathering tools were three checklists extracted from relevant studies which compare with 5 foreign library websites, and thei...

2009
Jose Nazario

The number of client-side attacks has grown significantly in the past few years, shifting focus away from defendable positions to a broad, poorly defended space filled with vulnerable clients. Just as honeypots enabled deep research into server-side attacks, honeyclients can permit the deep study of client-side attacks. A complement to honeypots, a honeyclient is a tool designed to mimic the be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید