Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prasad, Umesh
- Machine Learning Based Architecture for Rule Establishment of Web Proxy Server
Abstract Views :1698 |
PDF Views:6
Authors
Affiliations
1 Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, Madhya Pradesh., IN
2 Department of Information Technology & MCA, B.I.T. Mesra, Ranchi, Jharkhand., IN
3 Department of Computer Science and Engineering, B.I.T. Extension Centre, Lalpur, Ranchi, Jharkhand., IN
1 Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, Madhya Pradesh., IN
2 Department of Information Technology & MCA, B.I.T. Mesra, Ranchi, Jharkhand., IN
3 Department of Computer Science and Engineering, B.I.T. Extension Centre, Lalpur, Ranchi, Jharkhand., IN
Source
Journal of Applied Information Science, Vol 1, No 1 (2013), Pagination: 14-22Abstract
In present scenario Internet has become an integral part of every ones life, as many services like mail, news, chat are available and huge amounts of information on almost any subject is available. However, in most cases the bandwidth to connect to the Internet is limited. It needs to be used efficiently and more importantly productively. Generally, bandwidth is distributed among groups of users based on some policy constraints. However, it turns out that the users do not always use the entire allocated bandwidth at all times. Also, some times they need more bandwidth than the bandwidth allocated to them. Ideally, productive usage should be preferred over unproductive usage when bandwidth is scarce. But when it is abundant then any kind of use can be permitted provided it is in consonance with policy. The bandwidth usage patterns of users vary with time of the day, time of the year and requirements. So there is a need for dynamic allocation of bandwidth that satisfies the requirements of the users, manages variable usage and is consistent with administrative usage policy. Internet usage is varied and in the context of an institution or organization an administrator would like to maximize productive usage. There is, therefore, a need to implement control access policies, which prevents unproductive use but at the same time does not, to the extent possible, impose censorship. Squid proxy server is a full-featured web proxy, which increases the efficiency of the Internet link by providing caching and proxy services. Squid provides many mechanisms to set access control policies. However, deciding which policies to implement requires experimentation and usage statistics that must be processed to obtain useful data. The proposed architecture elaborated in this paper is based on machine learning to determine policies depending on the content of current URLs being visited. The main component in this architecture is the Squid traffic Analyzer, which classifies the traffic and generates URL lists. These URL lists are used in formulating access policies. The concept of delay priority will also be introduced which gives more options to system administrators in setting policies for bandwidth management. As Squid allows HTTP tunneling, it forms a loophole for strict policy management. In this paper the proxy tunneling in Squid has also been considered and some possible solutions to this problem will also be suggested.Keywords
Web Proxy, Machine-learning, Network Traffic, Meta DataReferences
- Mitchell, T. M. (1997). Machine Learning, McGraw-Hill.
- Tanenbaum, S. (1999). Computer Networks. (3rded.) Delhi: Prentice-Hall of India Pvt. Ltd.
- Luotonen, A. (1999). Tunneling TCP Based Protocols through Web Proxy Servers. Retrieved from www. webcache.Com/Writings/lnternet-Drafts/draft-luotonen-web-proxy-tunneling-01.txt
- Squid Proxy Server. Retrieved from www.squidcache.org
- Squid Frequently asked Questions. Retrieved from www.squid-cache.org/Doc/FAQj*
- Squid Configuration File: Squid Configuration. Retrieved from http://www.squid-cache.org/Doc/config/
- Squid configuration Manual. Retrieved from www. visolve.comjsquid24s1/contents.html
- david@luyer.net
- Upgrading to TLS within HTTP/1.1. (1997). Retrieved from www.ietf.org/rfc2817.txt
- HTTP-Tunnel Corporation-Networking Products for Corporate Communications. Retrieved from www.http-tunnel.com
- Cutting Edge Web Applications. Retrieved from www.totalrc.com
- Squid Cache Logfile Analysis Scripts. Retrieved from www.squid-cache.org/Scripts
- Calamaris: Log Analyzer. Retrieved from http:// cord.de/tools/calamaris/
- Webalizer: Log Analyzer. Retrieved from http:// mrunix.netjwebalizr
- Cache Digest Specification-Version 5. Retrieved from www.sequid-cache.org/CacheDigest/cachedigest-v5.Txt
- Hyper Text Transfer Protocol - HTTP/1.1. Retrieved from www.ietf org/rfc/rfc2616.txt
- Rousskov, A. & Soloviev, V. (1999). A Performance Study of the Squid Proxy on HTTP/l.0. World Wide Web, June, 2(1-2), 47-67.
- Chamara Gunaratne, Gihan Dias (University of Moratuwa) Using DynamicDelay Pools for Bandwidth Management URL: www.2002.iwcw.org/
- Squid Programmers Guide. Retrieved from www. squid-cache.org/Prog-Guide/prog-guide.html
- Lang, K. (1995). NewsWeeder: Learning to Filter Netnews. In Priedits & Russel (eds.), Proceedings of 12th International conference on machine learning (pp. 331-339). San Francisco: Morgann Kaufmann Publishers.
- Rish, I. (2001). An Empirical Study of the Naive Bayes Classifier. IJCAI-01 workshop on Empirical Methods in AI.
- Rish, I., Hellerstein, J. & Jayram, T. S. (2001). An Analysis of Data Characteristics that Affect Naive Bayes Performance. IBM Technical Report RC21993, 2001.
- Rish, I. (2000). Advances in Bayesian Learning. A short tutorial presented at ICAI'2000. Las Vegas.
- Database Management System for Prediction and Management of Occupational Health Hazards
Abstract Views :269 |
PDF Views:149
Authors
Umesh Prasad
1,
Gurmit Singh
2
Affiliations
1 Isabella Thoburn College, Lucknow, U.P., IN
2 Department of Computer Science and Information Technology, Sam Higginbottom Institute of Agriculture, Technology and Sciences, Allahabad, U.P., IN
1 Isabella Thoburn College, Lucknow, U.P., IN
2 Department of Computer Science and Information Technology, Sam Higginbottom Institute of Agriculture, Technology and Sciences, Allahabad, U.P., IN
Source
Journal of Ecophysiology and Occupational Health, Vol 12, No 1-2 (2012), Pagination: 77-84Abstract
The new paradigm envisioned for epidemiological studies in 21st century advocates shifting from the current survey based protocols to combination of evidence based laboratory/ clinical studies coupled with in silico approaches. One among the key strategies is to adopt an integrated approach, which can acquire, analyze, and interpret the data both qualitative and quantitatively in one go. But, this challenging task has highly hampered due to complexity of human physiological systems, ethical dubious, etc. Thus, the present investigations were aimed to develop an interactive online tool for prediction and management of human health for Indian population engaged in different occupation. At first step, a comprehensive questionnaire on human health risk assessment and management was developed and used for offline data collection. Simultaneously, a database management system (DBMS) was developed using software and programming languages mainly including MySQL, MS Office 2007, Hypertext Preprocessor (PHP), Cascading Style Sheets (CSS), Macromedia Dreamweaver, SPSS, java script, C++ language, Microsoft DOT NET, etc. For the purpose, the DBMS was developed and is being used through website "www.healthriskindia.in" for online survey. Upon the analysis of data collected from 2000 individuals of Jhansi and Lucknow districts of Uttar Pradesh, the socioeconomic status, education, hygiene status, occupation type, etc. were found to be associated with proneness to the diseases. Further, the relation between health status and day to day activities of the individuals engaged in different occupations of different groups in the society was analyzed successfully using DBMS. The analysis made in different combination of permutation using the data of 2000 volunteers show significant simulation with epidemiological data generated through conventional means for the mimicking population residing in the study area.Keywords
In silico, DBMS, Health, Risk.- The Feminine Anguish in Cry, The Peacock
Abstract Views :174 |
PDF Views:1
Authors
Affiliations
1 P.G. Dept. of English, Nalanda College, Biharshari, Nalanda (Bihar), IN
2 Dept of English, SPM College, Udantprui, Bihar Sharif (Bihar), IN
1 P.G. Dept. of English, Nalanda College, Biharshari, Nalanda (Bihar), IN
2 Dept of English, SPM College, Udantprui, Bihar Sharif (Bihar), IN
Source
Journal of Literature, Culture and Media Studies, Vol 1, No 2 (2009), Pagination: 53-59Abstract
In the patriarchal society, women have not been seen as the equal partners. They have been treated as the second-rate members in the family and the society. Simone de Beauvoir’s observation is very illuminating and cited in Feminism; Theory. Criticism, Analysis:“The situation of woman is that she-a free and autonomous being like all creatures-nevertheless finds herself living in a world where men compel her to assume the status of the other.” (33) She has been given away to a new master in a new house where she is not allowed to show her preferences. Her new master handles her in the way he likes. It does not occur to him that she is a living being and as such she has her own desires, aspirations and dreams. Her cries go unheard and her pain goes unfelt. But enough is enough. Time comes when her anguish becomes too pronounced to submit to repression. It manifests itself in trauma, suicide and death. This symptom generally remains unnoticed by male writers, but female writers x-ray the genuine feminine anguish. It is an integral part of their lives. Anita Desai’s two novels Cry, The Peacock and Voices in the City depict the inner climate, the climate of sensibility that rumbles like thunder and suddenly blazes forth like lightning. It is more compelling than the outer weather, the physical geography or the visible action. Since her preoccupation is with the inner world of sensibility rather than the outer world of action, she has tried to forge the style, supple and suggestive enough to convey the fever and fretfulness of the stream of consciousness of her principal characters.- A Dynamic Human Health Risk Assessment System
Abstract Views :281 |
PDF Views:0
Authors
Affiliations
1 Central Library, Isabella Thoburn College, Lucknow, IN
2 Department of Computer Science and Information Technology, Sam Higginbottom Institute of Agriculture, Technology and Sciences, Allahabad, IN
3 In Vitro Toxicology, Indian Institute of Toxicology Research, Post Box 80, Lucknow, Uttar Pradesh, IN
1 Central Library, Isabella Thoburn College, Lucknow, IN
2 Department of Computer Science and Information Technology, Sam Higginbottom Institute of Agriculture, Technology and Sciences, Allahabad, IN
3 In Vitro Toxicology, Indian Institute of Toxicology Research, Post Box 80, Lucknow, Uttar Pradesh, IN