The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays Internet has become a major public opinion formation and diffusion platform. How to acquire the public hotspots and trends by collecting and analyzing the massive data on the Internet is an important research topic in public opinion analysis. In this paper, we firstly introduce the definition and framework of Internet public opinion mining, then focus on the comparison and analysis of key...
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation on prefix hijacking and the Internet hierarchy is presented...
In this paper, we propose a local-betweenness-centrality (LBC)-based pinning strategy to stabilize undirected complex networked systems. Through two kinds of static real-world networks, the UAS airline routing map and the protein-protein interaction network, we show that the LBC-based pinning strategy, which only using the local information around the first and second neighbors of a focal vertex,...
The hand-held systems and the wireless Internet access are widely available in recent years. However, the mobile learning with web content is still inconvenient. For example, the information has not well organized and it is uneasy to surf on the small screen of handheld device. We propose a mobile system based on the content of Wikipedia. Wikipedia is a free content resource and has abundant contents...
As it is well known, there are lots of factors causing the fluctuation of stock prices. This paper studies this problem from the aspect of Internet information. The significant changes of Internet stock information usually reflect that some special events have occurred in that company. The fluctuation of stock prices must be an associated action. This paper firstly harvests financial information on...
The paper applied the data acquisition technology based on wireless network to noise automatic monitoring, combined with the hot issue of remote data transmission, explored and researched the noise data acquisition technique in the environment acoustic GIS management system of Wuhan. And it designed and realized the encapsulation format of the sending data, stored the data into the database of remote...
The growing number of crisis situations around the world in recent years has highlighted the urgent need to improve the capability of emergency response systems. When an emergency happens, the most important response is to promptly evacuate victims or potential victims from dangerous areas to safe places. The use of decision support systems can not only improve the efficiency of evacuation but also...
With different kinds of terminal clients coming up, adaptive content delivery is a hot research topic. The proxy, or the intermediary server, is often chosen to do the function of producing ldquoadaptiverdquo contents in real time. Admittedly, those resolutions addressed the adaptive aspect of content delivery very well. However, they did not make full use of another proxy's important character, which...
In this paper, we proposed a new approach of steganalysis based on frequency features from DCT coefficients. This method does not require any training and can be widely used on JPEG images from various sources. We have applied our algorithm on images captured from digital camera,the Internet, and compressed images from lossless format. Experimental results show it works well on detecting popular DCT...
With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of payment. TLA is One kind of logic brought forward...
In investigating concurrent system specification based on TLA+ (Lamport, 2002), the question of states transition and the properties and their correlation is a important branch. Always we check the properties of the concurrent system after system beginning transfer. But we thought to add the property into the transition system, that is to say the system has the property before transfer, and so the...
In recent years, the Internet-based teleoperation control has become a research focus. Compared with single robot, multi-robot system can be applied to many fields. It has the ability to complete the complicated tasks more rapidly and effectively. The combination form of the Internet-based multi-robot teleoperation system has attracted the widespread attention. However, due to the existence of the...
Active content transformation in Web is a hot topic in Internet content delivery research. In this paper, we proposed 3 different modes content transformation, which are whole-file buffering, byte-streaming, and chunk buffering. Based on the chunk dependence graph, we studied the performance for different modes and argued that the chunk streaming is the most appropriate transform model for Web intermediaries...
Digital animation is a widely used digital media on Internet to convey information. However, many animations nowadays are usually advertisements and contain only junk information. In order to detect and filter such information, a feature extraction, analysis and classification method for animation content understanding is proposed. A feature set composed of the traditional image/video features and...
Active content transformation in web is a hot topic in Internet content delivery research. In this paper, we proposed 3 different modes content transformation, which are whole-file buffering, byte-streaming, and chunk buffering. Based on the chunk dependence graph, we studied the performance for different modes and argued that the chunk streaming is the most appropriate transform model for Web intermediaries...
We study the modeling of the Internet at the autonomous system (AS) level with the following factors in the evolving situations: node birth with one or two new external links, new internal link birth, the death of node and link, nonlinear preferential attachment in local world. A novel evolving local world (ELWI) model is proposed to model the Internet, which is capable of capturing the complex topology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.