The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we illustrate the significance and advantage of combining the results of multiple detection methods. We implement these methods as bolts in a Apache Storm cluster which is a famous real-time computation framework. We simulate two kinds of anomalies — one involving large number of small network flows and the other involving small number of large network flows. The experiments show that...
With the development of Mobile and Wireless Network technology, Mobile learning (M-learning) becomes a focus after E-Learning. How can the farmers get requisite information of agricultural production by mobile phone? In order to solve this problem, the personalized mobile information system for the farmers has been designed and developed based on Ontology. It consists of four functional modules: information...
Topic model has attracted much attention from investigators, as it provides users with insights into the huge volumes of documents. However, most previous related studies that based on Non-negative Matrix Factorization (NMF) neglect to figure out which topics are widespread in the documents and which are not. These widespread topics, which we refer to coarse-grained topics, have great significance...
With rapid development of internet, more and more consumers choose to shop from different channels, such as offline channel and online channel. Some consumers prefer shopping through offline channel because they want to experience the products' quality in person, while other consumers would like to shop online because they care more about the efficiency of shopping. There are several factors that...
A mobile node who wants to communicate to the nodes in the Internet must firstly be configured a global IP address. The existing schemes have different drawbacks. A novel IP address auto-configuration scheme for MANET with multiple gateways is presented in this paper. It can provide the mobile node with MANET-local address and global IP addresses and guarantee that these addresses configured by this...
With IPv4 addresses quickly dwindling, the Internet is forcing an evolution of itself. During the long term transition from IPv4 to IPv6, what's going on in IPv6 world becomes unknown for network operators and researchers. In this paper, we propose a heuristic algorithm to identify p2p traffic accurately and implement traffic classification based on Netflow v9 exports to illustrate what applications...
We present block-level links based content extraction (BLCE)-a method to extract content from the web pages by using the link attributes of blocks, which contains the number of links and the length of link text (anchor text).We describe how to divide one web page into blocks and how to merge the similar blocks into one, then compute the number of links and the total length of anchor text. We find...
In this paper, we propose a simple, fast and accurate content extraction method: CELB. Compared with traditional methods, this approach does not parse the DOM trees and uses only information from lines of original HTML documents. We propose a concept called line-block, to extract contents more effectively and a new feature distance-text number (DTN) for distinctions between contents and non-contents...
Network has made significant influences on people, involving both negative and positive aspects, among which the most striking one may be the influence connected with the violence. The purpose of the current study was to explore the appraisal index of violent information to lay a foundation for online culture safety management. Empirical study indicated that the factors influencing the violent picture...
As the development of the Internet and the increment of the bandwidth, large-scale video transmission on the IP network is getting further development and application. Especially, the application of the broadcasting system based on single sender but multiple receivers are applied widely. Therefore, the multimedia data transmission is becoming one of the most important aspects in the broadcasting system...
Content-based copy detection (CBCD) recently has appeared a promising technique for video monitoring and copyright protection. In this paper, a novel framework for CBCD is proposed. Robust global features and local Speeded Up Robust Features (SURF) are first combined to describe video contents, and the density sampling method is proposed to improve the generation of visual codebook. Secondly, Smith-Waterman...
Personalized recommendation is an effective method to resolve the current problem of Internet information overload. In the recommendation systems, user modeling is a crucial step. Whether the model can accurately describe the users' interests directly determines the quality of the personalized recommendations. At present in most personalized service systems keywords models or user-item models are...
With the Internet developing, there are many documents on the same topic which contains redundance. Multi-Document summarization is a technology of natural languages processing, which extract important information from multiple texts about the same topic according to the compression ratio. Sentence selection is an important part of Multi-document summarization .In this paper, we design a calculate...
In order to improve the survivability of IP networks, this paper presents a fast self-healing mechanism for distance vector routing protocol called FS-DVP.(Fast Self-healing distance vector protocol). The mechanism can dealing with network failures effectively through the precomputed multiple feasible next hops per destination. This local rerouting scheme guarantee the forwarding continuity in the...
We present an intelligent workload factoring service for enterprise customers to make the best use of public cloud services along with their privately-owned (legacy) data centers. It enables federation between on- and off-premise infrastructures for hosting Internet-based applications, and the intelligence lies in the explicit segregation of base workload and trespassing workload, the two naturally...
Aiming at the RIP (routing information protocol) canpsilat dealing with network failures effectively, causing significant forwarding discontinuity after a failure. The drawback with this protocol is that it need to trade off routing stability and forwarding continuity. To improve failure resiliency without jeopardizing routing stability, we propose a fast local rerouting based on RIP called FR-RIP...
Sharing and integrating geospatial resources (geo-data and geo-processing) in opening Web environment is a challenge for GISystem. This paper discusses a geospatial information processing concept model complied interoperable system framework and an implementation approach for accessing geospatial information openly by chaining individual service module to assemble complex geospatial processing and...
In this paper we measured and analyzed the workload on Yahoo! Video, the 2nd largest U.S. video sharing site, to understand its nature and the impact on online video data center design. We discovered interesting statistical properties on both static and temporal dimensions of the workload; they include file duration and popularity distributions, arrival rate dynamics and predictability, and workload...
"Alice has a piece of valuable information which she is willing to sell to anyone who is interested in; she is too busy and wants to ask Bob, a professional broker, to sell that information for her; but Alice is in a dilemma where she cannot trust Bob with that information but Bob cannot help her find her customers without knowing that information." In this paper, we propose a security mechanism...
Along with information on the Internet increasing dramatically, People usually search and locate information that they needed by search engines. Clustering search engine results is an effective method to help people select information needed from the list of search engine results. The paper presents a clustering algorithm of no-word-segmentation for Chinese search engine results (CANWS). The algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.