The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Zero‐dimensional (0D) metal halides have drawn increasing attention due to the attractive structure dependent photoluminescence (PL) properties. Here, we report two new 0D organic–inorganic hybrid Sb‐based halides, (MTP)6SbBr6Sb2Br9⋅H2O (MTP=Methyltriphenylphosphonium, crystal 1) and (MTP)2SbBr5 (crystal 2), featuring a reversible structural phase transformation and tunable orange and red emissions...
Zero‐dimensional (0D) metal halides have drawn increasing attention due to the attractive structure dependent photoluminescence (PL) properties. Here, we report two new 0D organic–inorganic hybrid Sb‐based halides, (MTP)6SbBr6Sb2Br9⋅H2O (MTP=Methyltriphenylphosphonium, crystal 1) and (MTP)2SbBr5 (crystal 2), featuring a reversible structural phase transformation and tunable orange and red emissions...
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques work well in some developed countries, the assumption of a strong delay-distance correlation that they often rely on may fail in many developing countries for poor network connectivity...
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on should be migrated to the target machine, so as to ensure the complete consistency of the data accessed by the transplanted target codes and the data accessed by the source codes. Firstly,...
Affinity Propagation (AP) clustering does not need to set the number of clusters, and has advantages on efficiency and accuracy, but is not suitable for large-scale data clustering. To ensure both a low time complexity and a good accuracy for the clustering method of affinity propagation on large-scale data clustering, an improved AP clustering algorithm named hierarchical affinity propagation (HAP)...
This paper proposed an anomaly detection method that can be used in high speed network backbone. To adapt for the need of online cost-sensitive data processing, some of the attributes are extracted from the header of packets and recorded by sketching in a fixed time window. Based on non-extensive entropy with different parameters, the original distribution of the values of attributes is decomposed...
Binary translation is the emulation of one instruction set by another through translation of code. Sequences of instructions are translated from the source to the target instruction set. The semantic equivalence conversion of instructions is the core of a binary translation system. In order to simulate the behavior of a program on the target platform more accurately, the change of the special state...
Multi-source binary translation system (MBT) provides a multi-source platform code to a single target platform migration solution. Do not know the source code, you can achieve the multi-source platform, multi-compiled version of the executable file on another platform. In order to achieve the special semantic mapping function of the MBT system, the need for a unified, compatible with multiple target...
Tracking changes in traffic feature distributions and using it to classify traffic with different behavior is very important in the domain of network anomaly detection. Shannon entropy can be used to find changes in the normal distribution of network traffic to identify anomalies. Standardized entropy provides a measure of uniformity and randomicity on the same baseline for vectors or variables in...
Finding information about real identity of email users from emails is one of the important topics in email mining. Existing methods focus extracting name information of users from email datasets, but not pay much attention to the research about aliases that belong to the same user. That extracting user's aliases and ranking authority of the aliases is very significant to some network researches and...
Identifying the true type of an arbitrary file is very important in information security. Methods based on file extensions or magic numbers can be easily spoofed, while a more reliable way is based on analyzing the file's binary content. We propose an algorithm to generate models for each file type based on analyzing the binary contents of a set of known input files by using n-gram analysis and design...
As email playing an increasingly important role in the online world, analyzing and mining on email communication network draw more and more attention, in which community detection is one of the most key technologies and applications. Based on the intuition that the edge topic is more focused than the node topic in a short period, this paper proposes an edge-content based email network community detection...
Concerning the requirement of e-mail filtering to improve the efficiency and accuracy in e-mail mining, topic detection, and many other specific applications, learnt from traditional spam filtering methods, an approach based on feature analysis and text classification is proposed. Utilizing some structural features which are very likely to identify an irrelevant e-mail, such as group sending, embedded...
Emails play an important role in our daily life. It has been recognized that clustering emails into meaningful groups can greatly save cognitive load to process emails. Mailbox user becomes more and more concerned about how to organize and manage the emails as well as how to mine the meaningful data conveniently and effectively. This paper proposes a novel personal topics detection approach using...
One major problems in the field of social network analysis is how to discover the important and influential nodes based on the network structure. To address this challenge, we propose and use some measures to measure node importance, such as degree measure, improved cluster coefficient measure and a new ranking method based on reputation. Thinking of the unilateral influence of the single measure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.