The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network traffic classification can be employed for providing enhanced Quality of Service (QoS), network security, traffic management, etc. Classifying network traffic with statistical characteristics of traffic flows has the advantages of fast processing speed, fairly high accuracy, ability of handling encrypted traffic, etc. However, Nagle's algorithm coalesces small TCP packets, and sometimes there...
“Scenario-Response” is regarded as the most effective unconventional emergency management method. As unconventional emergency is dynamic event, at different stages for different emergency conditions, a different contingency plan should be applied. In this research, we choice the combination unconventional emergency response program based on real-time information, data mining, forecasting and scenario...
Data mining in wireless sensor networks (WSNs) is a new emerging research area. This paper investigates the problem of real time clustering of sensory data in WSNs. The objective is to cluster the data collected by sensor nodes in real time according to data similarity in a d-dimensional sensory data space. To perform in-network data clustering efficiently, a Hilbert Curves based mapping algorithm,...
Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work has shown that direct sampling of user lifetimes may lead to certain bias (arising from missed peers and round-off inconsistencies) and proposed a technique that estimates lifetimes based on sampled residuals. In this paper, however, we show that under non-stationary...
Water quality of Darning Lake, located at the central district of Jinan City of China, can be obviously affected by the external nutrients loading. There are about 8.07times107 kg seriously contaminated loosing sediment with 1.30times105 kg phosphorus in the lake sediment. The buffering effect of the sedimentary phosphorus plays a critical role in the lake water quality. Under natural conditions,...
Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purpose, such as redistribution. In order to characterize the fingerprints that can withstand collusion attack, Dittmann et. al proposed the definition of anti-collusion codes (ACCs). In this paper, we present a new approach to construct anti-collusion codes based on cover-free families. All the previous...
Two results on robustness of observability for linear time-varying systems are presented, based on which, it is shown that, the observability of corresponding linearized system implies local observability of the original nonlinear system. A numerical example is given to demonstrate the presented result.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.