The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The network traffic has been growing explosively in recent years after users can watch the high quality video from the Internet. It is an important issue to reduce network traffic and increase the user quality of experience (QoE). Therefore, there have been in-network caching schemes to cache the content fetched by users in proxy servers. Recently, software defined networking (SDN) was proposed to...
This paper proposed a new kind of online education mode, MOOE (Massive Open Online Experiment). MOOE was produced based on the thoughts of the Internet thinking and the opening-and-sharing resources and was the organic combination of MOOC and experimental teaching. The main contributions were made: (1) Instructed MOOE's concept and characteristics. MOOE build a network laboratory with the advanced...
The interval time distribution is a well investigated in the area of 'human dynamic'.Many research explained the heavy tail phenomenon and reproduced the heavy-tail-like interval time or response time distribution with various models. This paper empirically studies human online activities both at individual level and group level based on 'T-mall' data set and 'Wikipedia' data set. It points out that...
The recent advances in wireless communication techniques have made possible for vehicles to download from the roadside communications infrastructure, namely drive-thru Internet. However, due to the fast-motions, harsh and intermittent wireless channels, the download volume of individual vehicles per drive-thru is quite limited as observed in real-world tests. This severely restricts the service quality...
Through the real systematic integration development and applied design based on “3S” & “IT” it is suggested to the solution in the informatization of emergency management, realizing the data providing of dynamic, real-time emergency information.
Hadoop Distributed File System (HDFS) has been widely adopted to support Internet applications because of its reliable, scalable and low-cost storage capability. Blue Sky, one of the most popular e-Learning resource sharing systems in China, is utilizing HDFS to store massive courseware. However, due to the inefficient access mechanism of HDFS, access latency of reading files from HDFS significantly...
Intelligence is a very important characteristic for cognitive radios (CR). Design of cognitive engine and application of artificial intelligence (AI) techniques are key to the implementation of this characteristic. Machine learning is one of the disciples in AI. This paper will propose a scheme of cognitive engine design, and use a learning algorithm based on neural network (NN) to implement a learner...
Streaming media application has attracted more and more attention nowadays. However, how to improve the quality of service (QoS) for streaming media application is still a challenging issue. The emerging transport protocol - Mul-TCP Friendly Rate Control (MulTFRC), which gives different priorities to data flows, could be used in streaming applications or similar use cases. On our test bed, some streaming...
Address information is essential for people's daily life. People often need to query addresses of unfamiliar location through Web and then use map services to mark down the location for direction purpose. Although both address information and map services are available online, they are not well combined. Users usually need to copy individual address from a Web site and paste it to another Web site...
Hadoop distributed file system (HDFS) becomes a representative cloud storage platform, benefiting from its reliable, scalable and low-cost storage capability. HDFS has been utilized in BlueSky, one of the most prevalent e-Learning resource sharing systems in China, to store and share courseware majorly in the form of PowerPoint (PPT) files and video clips. Unfortunately, HDFS does not perform well...
Earth observation data will be moved through satellite constellations to ground stations by space internet. Routing observation traffic in this environment is constrained by factors such as satellite orbits, satellite capabilities, observation schedules, ground station schedules, and rapidly evolving natural events. Among many global routing algorithms, Dijkstra Algorithm is mostly preferred as it...
With the development of internet technology, the entire amount of data on the internet has shown the explosive growth. Some researchers have paid their attention to find an effective way to store and manage these data. In this paper, we introduce a load rebalancing algorithm to solve the load balancing problem among all chunk servers(compute nodes) in the distributed file system; it also ensures that...
Space based Internets will be used to move earth observation data through satellite constellations to ground based receiving stations. Routing observation traffic in this environment is constrained by individual satellite orbits, individual satellite capabilities, observation schedules, ground station schedules, and rapidly evolving natural events. Among many global routing algorithms, Dijkstra algorithm...
How to rapidly disseminate a large-sized file to many recipients is a fundamental problem in many applications, such as updating software patches and distributing large scientific data sets. In this paper, we present the Bee protocol, which is a cooperative peer-to-peer data dissemination protocol aiming at minimizing the maximum dissemination time for all peers to obtain time-critical data, such...
SSL is a protocol which provides effective security for Web transaction. This paper introduces the principle of standard SSL handshake protocol and analyzes its performance at first. Then a CSK (combined symmetric key) based SSL handshake protocol is proposed. This protocol uses CSK technology to authenticate both communication sides and uses symmetric key to encrypt/decrypt the secret information...
To solve the congestion of network on Internet and improve the throughput, the thesis puts forward an improved algorithm based RED and display feedback mechanism. The average queue length always is close to the max threshold in RED algorithm, and then the delay of the packet is very long. The throughput of the network is low. The new way that using BP NN forecasts the network's situation in the future...
Proposal of cloud computing is tightly coupled with low cost. Reduction of cost is considered as an important advantage of cloud. However, there are no available tools proper for cost calculation and analysis in Cloudenvironment. This paper presents our efforts towards filling in the gap. We format suits of metrics and formulas for the calculation of Cloud Total Cost of Ownership(TCO) and Utilization...
Although the Internet is revolutionizing the way companies provide their products and services to their customers, marketing studies that investigate consumer acceptance of this technology are limited. The key is trust, which is significant barrier for realizing the potentials of C2C e-commerce. This paper, firstly, review briefly research on trust in e-commerce. Then, a trust model based on game...
The wide spread of worms poses serious challenges to today's Internet.Various IDSes (intrusion detection systems) have been proposed to identify or prevent such spread. These IDSes can be largely classified as signature-based or anomaly-based ones depending on what type of knowledge the system knows. Signature-based IDSes are unable to detect the outbreak of new and unidentified worms when the worms'...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.