International Journal of Computer Networks and Communications Security

Volume 3, Issue 1, January 2015

 

 

 

Google Trends: ready for real-time suicide prevention or just a Zeta-Jones effect ?

Pages: 1-5 (5) | [Full Text] PDF (424 KB)
G Fond, A Gamanb, E Haffenb, P Llorca
Universite Paris Est-Creteil, Pole de Psychiatrie des Hopitaux Universitaires H Mondor, DHU Pe-Psy, INSERM U955, Eq 15
Fondation Fondamental, Foundation de Cooperation en Sante Mentale
CHU Clermont Ferrand, France
Network of centres for Schizophrenia, Creteil 94000, France
Department of Clinical Psychiatry, University Hospital of Besancon, Besancon, France

Abstract -
Two studies have shown that increasing the consultation of the word suicide in the Google search engine was associated with a subsequent increase in the prevalence of suicide attempts. The purpose of this paper was to analyse the trends in Google searches on suicide, depression and bipolar disorder. Methods. Based on previous studies, the frequency of the search words how to suicide and commit suicide were analysed for suicide, as well as antidepressant and depression for depressive disorders. Results and conclusions. Together, these analyses suggest that the search for the words how to suicide or commit suicide on the Google search engine may be a good indicator for suicide prevention policies. However, the tool is not developed enough to date to be used as a real time dynamic indicator of suicide epidemics. The frequency of the search for the word suicide was associated with those for depression but not for bipolar disorder, but searches for psychiatric conditions seem to be influenced by media events more than by real events in the general population.
 
Index Terms - Suicide, Google, Internet, Prevention, Depression, Bipolar

Citation - G Fond, A Gamanb, E Haffenb, P Llorca. "Google Trends: ready for real-time suicide prevention or just a Zeta-Jones effect ?." International Journal of Computer Networks and Communications Security 3, no. 1 (2015): 1-5.

 

An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection

Pages: 6-10 (5) | [Full Text] PDF (347 KB)
AT Siahmarzkooh, S Tabarsa, ZH Nasab, F Sedighi
Ph.D Student, Department of Computer Sciences, University of Tabriz, Tabriz, Iran
MSc Student, Department of Computer Engineering, University of Mirdamad, Gorgan, Iran

Abstract -
IDSs which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been used in the literature. During recent years, number of attacks on networks has dramatically increased and consequently interest in network intrusion detection has increased among the researchers. In this paper we have used the terms detection rates and false alarm rates to compare the results of Naïve Bayes algorithm and Support Vector Machine algorithm to find out the results for intrusion detections and by using Naïve Bayes method with Genetic Algorithm technique try to improve the rates for better detection. The proposed algorithm is used for comparative study we have done in this paper on the basis of which we measure the performance and usefulness of particular methods in detecting specific class of attacks. Experimental results performed using the KDD99 benchmark network intrusion detection dataset indicate that it can significantly reduce the number and percentage of false positives and scale up the balance detection rates for different types of network intrusions.
 
Index Terms - Intrusion Detection System, Naïve Bayes, Support Vector Machine, Genetic Algorithm, KDDCup99 dataset,False alarm Rates

Citation - AT Siahmarzkooh, S Tabarsa, ZH Nasab, F Sedighi. "An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection." International Journal of Computer Networks and Communications Security 3, no. 1 (2015): 6-10.

 

Distributed Backup of User Profiles for Information Retrieval

Pages: 11-15 (5) | [Full Text] PDF (304 KB)
A Issam, C Salma, L Amine, BLE habib
Faculty of Sciences Ben M SIK, Department of mathematics and informatics, Casablanca, Morocco

Abstract -
The information research systems tends mainly to model the user according to profile and then integrate it into the chain of access to information, to better meet their specific needs. Given the large number of user profiles available on the internet, the safeguarding becomes problematic. This paper presents a technic of safeguard and of implicit construction of the user profile that is part of a distributed backup approach and a formal construction method using the user behavior as a source for predicting implicitly its need.
 
Index Terms - User profile, Formal context, Personalization, Information research systems

Citation - A Issam, C Salma, L Amine, BLE habib. "Distributed Backup of User Profiles for Information Retrieval." International Journal of Computer Networks and Communications Security 3, no. 1 (2015): 11-15.

 

Performance Evaluation of Real Time Applications for RIP, OSPF and EIGRP for flapping links using OPNET Modeler

Pages: 16-26 (11) | [Full Text] PDF (996 KB)
A IQBAL, SLA KHAN
Network & Communications Infrastructure, IT Department, Georgian College, Barrie, ON, Canada
Computer Networks Department, Ryerson University, Toronto, ON, Canada

Abstract -
Present day Internet and communication systems heavily rely on the basis of IP Routing protocols. These different routing protocols are mainly categorized as static, dynamic and hybrid routing protocols. The selection of these routing protocols depends upon the network requirement and performance parameters of different real time applications. This paper investigates the performance of voice and video traffic in RIP, OSPF and EIGRP for flapping unstable links. We are considering the use of OPNET simulation tool to analyze the performance of these routing protocols i.e. RIP, OSPF and EIGRP. In this investigation the impact of flapping links on convergence time, packet end-to-end delay, packets drop in IP network, voice jitter, video packet delay variation and HTTP page response time is considered. The simulated results showed that flapping links have a significant impact on the overall performance of IP based networks affecting specially the network convergence time and packet drops in the network.
 
Index Terms - Routing Protocols, Real Time Applications, Link flapping, Unstable networks

Citation - A IQBAL, SLA KHAN. "Performance Evaluation of Real Time Applications for RIP, OSPF and EIGRP for flapping links using OPNET Modeler." International Journal of Computer Networks and Communications Security 3, no. 1 (2015): 16-26.