The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-sensors fusion to construct an accurate 3D map about unknown indoor scene and outdoor in the simultaneous localization and mapping (SLAM) area is becoming increasingly popular. In this paper our methods pay an attention to how to optimize the 2D map from the indoor or outdoor unknown large-scale environment and how to make the 3D map intuitive and accurate. Firstly, this paper accomplished the...
The present work introduces an improved approach of analyzing and storing status data of enterprise network. Raw data collected was pre-processed with Hadoop, the famous open-source distribute computing framework. After the pre-process procedure, an open-source information retrieval software library, Lucene, is introduced to do the following data indexing and analyzing job in this research. With the...
With the development of the Internet and the explosive growth of business data, there are massive Network User Virtual Identities (NUVIs) on Internet when network user accessing different applications. Compared with previous methods, we will propose an algorithm to analyze which NUVIs belong to the same person. What's more, our approach is based on the cloud computing platform and the cluster system,...
In recent years, with more and more people shopping, chatting and video online, the Internet is playing a more and more important role in human's daily life. Since the Internet is so close to our lives, it contains so much personal information that will cause a lot of troubles or even losses when divulged. So it's necessary and urgent to find a efficient way to detect the abnormal network behavior...
A unified detection-tracking-estimation vision navigation system and algorithms framework for position and pose estimation of UAV (unmanned aerial vehicle) is proposed in this paper. The major contribution of this work is a novel cooperative object detection algorithm for robust detection of UAV: the spatial color pattern and temporal flicking pattern of the cooperative markers (groups of LEDs) mounted...
Network virtualization as an important research, will have a far-reaching effect on next generation network. However, the current studies of virtual network (VN) pay more attention to the utilization of the substrate network (SN) and optimization of mapping algorithms, whereas the course of mapping they ignore some serious weaknesses such as substrate network's high availability. This paper we forces...
With the widespread popularity and rapid development of Internet, the network is becoming more complex. Analysis of network node behavior can be crucial for network management and service provisioning. In this paper, we conduct the detailed measurement analysis of the network node (NN) traffic characteristics based on a large-scale data set collected from an enterprise network traffic monitoring device,...
In recent years, with the rapid development of the Internet on a global scale and the prompt popularization of various App applications, the Internet is increasingly becoming an integral part of people's lives. Meanwhile various network problems caused by abnormal network behavior have become more prominent than any time before. Furthermore we also have a lot of personal information on the Internet,...
In the past few years, the network is an essential part in human's life. More and more people choose shopping, chatting and video online. All the online activities produce tons of data which contain our behavior characteristics. Traditional data analyses just focus on one kind of feature, while they neglect the behavior information generated by merging multiple features. Based on the basic data set,...
This paper introduces the popular universal forum systems in domestic mainstream forum and analyzes the unique characteristics of these forum systems. Based on these unique characteristics, we propose the concept of system fingerprint which can used to detect the different systems of forum exactly and extract the users' information efficiently. It contributes to the development of network information...
Discovering the Ethernet's topology is very important for the network management. The way Based on STP and the way Based on AFT are the two main ways to do it. But hey both have some shortcomings when we do the discovering only by one of them. In this paper, we propose a new algorithm Based on the two ways to discover the topology in the LAN which will perform better. When there are switches which...
Analysis of network user behavior inside enterprise intranet becomes more and more crucial for enterprise network management and business analysis of internet applications. In this paper we focus on the web surfing analysis to capture the users' behavior. We examine the web surfing classification data both on individual level and network level. 12 classes of web pages are taken into consideration...
With the technology of geographic information system (GIS) developing and the application of enterprise-level GIS gradually wide, it is necessary to build the high-availability spatial database. Now there are not commercial spatial database software which can realize the high-availability. The paper proposes the architecture of high-availability spatial database based on popular object-relation database...
Network virtualization, through building multiple virtual networks on top of a shared substrate, provides a potential strategy for addressing the ossification of the Internet and encourages network innovation. Traffic clustering is the base and key technology in network virtu-alization. This paper presents a two-layer traffic clustering algorithm. In the first layer, different types of user traffic...
The influences of milled RAP on cement stabilized crushed stone base are studied in this paper. The tests show that (1) with the RAP2.36 content w growing, the strength of cement stabilized crushed stone base increases first and then decreases, the modulus of resilience decreases first and then increases, when w comes up to about 20%, the strength reaches its max value and the modulus reaches its...
The paper analyzed the methods of extracting information from the network traffic, among which the information extraction based on the Tag marker was studied in depth. Tags, which contain specific core words, can be considered as markers of different types of information. Due to the non-standardized nature the Tag marker, a Tag often has lots of interference characters and the traditional pattern...
Identification of Chinese coding type is a major and challenging issue in Chinese web content audit and analysis. In this paper we develop a novel algorithm based on the theory of Kolmogorov complexity to identify the coding type of Chinese characters of a given text segment. An array of text compressors are used as filters to evaluate the information distance of text under examination and the training...
The distinctive spatial location of Qinling Mountains makes its ecological environment protection very important and indispensable. Using currently advanced GIS technology, we built the decision support system of Qinling ecological environment protection. The system not only efficiently manages spatial information, thematic information, ecological environment information and resource information,...
This paper brings forth building spatio-temporal reasoning architecture and spatio-temporal query system based on adopting geo-ontology to represent spatio-temporal information knowledge and employing SWRL rules to express spatio-temporal reasoning rules. When carrying through spatiotemporal reasoning this paper adopts Jess to be a reasoner, which is the core of the whole architecture. Before carrying...
Geo-ontology provides explicit and formalized definition of shared geographic concepts, applied to aspects such as sharing and interoperating geographic information, integrating geographic information based on semantics and geographic information service. This paper adopts geo-ontology to establish logistics domain ontology so as to store abundant semantics information and represent intricate dependent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.