The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual community performs more and more important role for online users. Many tools for virtual community design, implementation and management have been developed, such as virtual reality (VR). On the other hand, few popular technologies have received frequent usage because of cost and time consuming. In this study, a platform for building virtual community more easily and quickly is proposed, which...
Traditional collaborative filtering recommendation algorithms face the cold-start problem. A collaborative filtering recommendation algorithm based on the implicit information of the new users and multi-attribute rating matrix is proposed to solve the problem. The implicit information of the new users is collected as the first-hand interest information. It is combined with other rating information...
In modern Web Applications, how to design a flexible and changeable report is always one of the key problems to web software designers and developers. Here by analysis the web report tasks and its characteristics, based on the research of the software bus technologies, component technologies and template technologies, with software bus and template technologies illustrates a task driven based generic...
The proposes of this study is to ascertain the effect of using incomplete linguistic preference relations based group decision making under a fuzzy environment to help decision makers select the best one amongst multiple criteria and alternatives. This study not only applies multi-criteria decision making with incomplete linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise...
In service-oriented architecture (SOA), the services and workflows have a close relationship, a number of services can constitute workflows, and the service itself can be achieved based on workflows. Because of dynamic changes of the constitution and service itself, the distributed computing method is quiet different with the traditional workflow management model in service-oriented workflow (SOWF)...
Aimed at the characteristics of huge systems, complicated distributed structures and difficult fault diagnosis of large equipments, an extensible system of distributed online monitoring and multi-level intelligent fault diagnosis based on hybrid wireless network techniques was presented and designed. The entire system includes four hierarchy's subsystems. The first subsystem is monitoring sensors...
The user-based security model and its replay protection principium are firstly introduced and then a replay protection scheme based on random number is proposed to avoid baleful replay attack because of the inefficiency of the USM. A random number is used as the authentication between manager and agent in this scheme, and the number is changed on each message exchange to ensure the agent can identify...
This paper presented an improved routing algorithm K-CSSP of structured P2P overlay networks based on clustering the nodespsila communication history of the CSSP. This routing algorithm computing the nodespsila stability via storing the nodespsila communication history distributed. The K-CSSP uses the K-means algorithm to cluster the CSSP nodes by the stabilities into K regions which inter-linked...
In this paper an MRESDL dynamic model is proposed for analyzing file diffusion in a node-to-node (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each node not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. The well-known medical model SIR is applied...
P2P worm based on loopholes spreading in peer-to-peer network is a serious security threat. According to the characteristics of P2P worms, a signature-behavior-based P2P worm detection approach detecting the known P2P worm based on characteristic string matching is proposed. In addition, this method can also detect unknown P2P worms based on behavior. This method is mainly composed of the technology...
The most popular routing algorithm in p2p network is that every node keeps a route table which records a certain number of other nodes. Such algorithm selects neighbor nodes at random, and this reduces routing efficiency. In this paper a new algorithm of optimizing p2p overlay network topology is proposed, which is based on minimum maximum k-means principle. According to the communication history,...
With the development of application of the peer-to-peer networks, the problem of the privacy preservation has aroused extensive concern. Though many previous researches have focused on the realization of the anonymous communications, these anonymous technologies usually need complex structures which increase the cost of maintenance and the difficulty of management, and prolong the transmission delay...
The data in e-commerce holds the characteristics of distribution, heterogeneousness, sparseness, high dimension and mass. So data mining system in e-commerce should be able to deal with the data in the different environments. As a novel distributing computing technique SOAP is designed for increasing interoperability within the wide range of programs and environments. This paper provides insights...
The SIP-based VoIP system is build on the IP network, so it is affected by the IP network security problem. SIP-based VoIP system has many security problems because of the security mechanism of VoIP system and other external factors. These effects relate to the following three aspects: confidentiality, integrity and availability. This paper analyzed the mechanism of VoIP system and the components...
In large scale structured p2p network system, in order to improve the data availability and reduce the effect caused by one exception quitting, the method of replicating data actively to other nodes is used to increase data redundancy. To reduce the replication cost, this paper presents a detailed description of replication strategy based on file-partition. The data file is partitioned into pieces...
Recent research efforts in the fields of data stream processing show the increasing importance of processing data streams, e.g., in the e-science domain. Together with the advent of peer-to-peer (P2P) networks and grid computing, this leads to the necessity of developing new techniques for distributing and processing continuous queries over data streams in such networks. These systems often have to...
In current applications, P2P system has become a robust environment for data integration. But the data sources of P2P system are autonomous and heterogeneous, which increase the difficulty of data integration. Current researches focus on how to manage information of data resources and ensure the data quality of data integration in P2P system. This paper presents a quality-oriented data integration...
A distributed security MIPv6 model based on dynamic policies is presented to solve the security compatible problem between MIPv6 nodes and the access network. We combine the distributed defensive structure and MIPv6 to build a distributed secure MIPv6 structure based on policies, and implement the dynamic transference of secure policies during mobile nodespsila movement, thus to make the model has...
In this paper, we have researched the conceptions and methods of the image compression and chaotic, then improved the information hiding algorithm based on the least significant bits (LSB). Embedding the compressed watermarking image in the host image with chaotic method, this can enhance the robustness and security of the LSB algorithm. The experiment results demonstrate that the algorithm is stable...
This paper proposes an algorithm model based on the machine learning and statistic forecasting method to forecast the traffic information. It constructs the forecasting specimens set by the mechanism learning of the machine learning, forecasts the short time traffic information by the data fit return technology, and constructs the knowledge base, which uses the concept of knowledge maturation degree...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.