Results 41 to 50 of about 7,837 (220)
A solution for secure use of Kibana and Elasticsearch in multi-user environment
Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities.
Nakamura, Tomoaki +3 more
core +1 more source
Multimedia big data computing for in-depth event analysis [PDF]
While the most part of ”big data” systems target text-based analytics, multimedia data, which makes up about 2/3 of internet traffic, provide unprecedented opportunities for understanding and responding to real world situations and challenges ...
Ayguadé Parra, Eduard +2 more
core +1 more source
Evaluation of the ATLAS model for remote access to database resident information for LHC Run 3 [PDF]
The ATLAS model for remote access to database resident information relies upon a limited set of dedicated and distributed Oracle database repositories complemented with the deployment of Frontier system infrastructure on the WLCG (Worldwide LHC Computing
Gallas Elizabeth J, Dimitrov Gancho
doaj +1 more source
E-commerce Personalization with Elasticsearch
Abstract Personalization techniques are constantly gaining traction among e-commerce retailers, since major advancements have been made at research level and the benefits are clear and pertinent. However, effectively applying personalization in real life is a challenging task, since the proper mixture of technology, data and content is complex and ...
Konstantinos N. Vavliakis +2 more
openaire +1 more source
DNS tunneling Detection Using Elasticsearch
Abstract Domain Name System (DNS) Protocol is a popular medium used by malware to perform ‘command and control’ in taking over victim’s computer, this technique called as DNS tunneling. Moreover, DNS tunneling can also be used to bypass captive portal hotspot in public places and worsen the network quality.
A F Sani, M A Setiawan
openaire +1 more source
Scalable and Multifaceted Search and Its Application for Binary Malware Files
Malicious binary files are a serious threat to industrial information systems. Because of their large number, an automatic assistant tool becomes essential for analysis, and finding similar files would be a great help.
Donghoon Kim +2 more
doaj +1 more source
Faster Base64 Encoding and Decoding Using AVX2 Instructions [PDF]
Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of
Lemire, Daniel, Muła, Wojciech
core +2 more sources
DESIGN AND IMPLEMENTATION OF AN INTELLIGENT SEARCH SYSTEM BASED ON NEURAL NETWORKS
Background. In the digital information era, the ability to retrieve relevant data quickly and accurately is increasingly critical. Traditional search engines such as Google or Bing rely on keyword matching, which can fail in cases of vague queries ...
Vitalii Bozhovskiy, Halyna Klym
doaj +1 more source
IMPLEMENTASI FULL TEXT SEARCH PADA SISTEM INFORMASI PERPUSTAKAAN MENGGUNAKAN LARAVEL
Keberadaan suatu perpustakaan sekolah merupakan suatu hal yang sangat penting dan dibutuhkan dalam setiap sekolah. Karena pentingnya perpustakaan dalam sekolah tersebut maka perlu disediakan suatu sistem yang mampu mengelola berbagai kegiatan mengenai ...
Irham Asyhari, M. Subchan Mauludin
doaj +1 more source
Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons.
Khatchadourian, Raffi +1 more
core +3 more sources

