The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we discuss about the use of computer simulations for sustainable systems. Specifically, we propose laboratory practices for Automatic Control subjects where the plants are sustainable systems. The interest is the simulation of this kind of systems to forecast their behavior in order to control and actuate over them. In this paper, the use of a didactic material for laboratory practices...
How will information from online banks influence the choice of customers? This research uses information processing theory, WOM theory, perceived risk theory and trust theory, in order to find the flow of information from online banks to customers, and the relationships among those issues. Moreover, online banks in Mainland China are the targets of this research.
By constructing the exponential delay cost function, we formulate the consumer decision model based on the threshold strategies in dual-mechanism, and prove that there exists a unique symmetric Nash equilibrium in which the high-valuation consumers use a threshold policy to choose between the two selling channels. Then we extend our model under general delay cost function, and find that consumers...
The environment of information dissemination is represented by complex network. The information here can represent viruses in the network, advertisements, hot topics, public opinions , rumors and so on. A new mathematical model describing the propagation process of information in the complex network is proposed using multi-agent simulation and discrete event simulation methods. The model is developed...
In this paper, we conceptualize customer bonding of e-tailors. We then construct a static theoretical model which describes the relationship between bonding and business performance for e-tailors. Based on the dynamic process of buyer-seller relationship, we further construct a theoretical dynamic model of effect of bonding on business performance at different stages of buyer-seller relationships...
This paper presents a framework for Aggregated Social Graphs, the ASG Framework, for developing applications that harness information available on social networking sites and telecom platforms to make communication simpler and richer. The framework aggregates users social graph by harnessing contact and social information from multiple communication environments and then calculating the social strength...
One of the most interesting and still not completely understood phenomena happening in Social Network Sites is their ability to spread (or not) units of information which may aggregate to form large distributed conversations. In this paper we present the result of an empirical study on a Large Social Database (LSD) aimed at measuring the factors enabling information spreading in Social Network Sites.
We propose a web clustering method using social bookmarking data with dimension reduction regarding similarity. To realize this idea we construct the similarity matrix between web pages based on their cooccurrence frequency. Since the similarity matrix includes various kind of noise, we map the similarity matrix onto lower dimension feature space to reduce the noise. Especially we carry out dimension...
This paper analyzes the deficiencies of current trust systems based on PKI (Public Key Infrastructure), ambiguity certificate principal information, and complicated identification process. Inspired by biologic gene technique, we propose a novel Cloud Trust model based on Family Gene (CTFG) model. The model answers the existing questions in tradition trust model by adopting the technology of family...
As the users of social network sites increases, the types of applications service social network sites provide are becoming more and more. This paper establishes an SNS graph generation model based on social services provided by kaixin.com, which describes the intrinsic relationship of entities (users, groups, applications, posts, and albums) in the site; extracts some rules according to the relationship...
In this paper, dynamics of the delayed Internet TCP-RED congestion control model is considered employing the analysis software of the delayed dynamical systems-DDE-BIFTOOL. The transmission delay τ1 can make it subject to Hopf and Fold bifurcation, thus the averaged queue length and arrival rate would be the approximately constant or vary periodically. The important effects of the transmission delay...
Even though internet banking service provides advantages for both customers and the bank, there is still a large group of customers refusing to use this service. So there is a need to identify the factors that determine customer acceptance of Internet banking service. This study based on the TAM, integrating trust perception and perceived risk to predict the user intention. And this study extended...
We studied a class of Service Overlay Network (SON) capacity allocation problem. By analyzing the problem with two different nonlinear optimization formulations, we show that the prices of offering service guarantees are closely related to a set of Lagrange multipliers. Moreover, if the Grade of service (GoS) constraints are not hard requirements, the network design resulting from the set of prices...
We present a State Estimation based Internet traffic flow control system where the objective is to maximize the aggregate bandwidth utility of network sources over their transmission rates. The network links and sources are viewed as processors of distributed computation and the control mechanism is based on estimation and optimization framework to solve the dual problem. The novelty of our approach...
The ability to deliver different performance levels based on tenant-specific service level agreements (SLAs) is a key requirement for multi-tenant Internet applications. However, workload variations and extensive resource sharing among tenants make this goal hard to achieve. We address the issue with a performance regulator based on feedback-control. The regulator has a hierarchical structure, with...
BitTorrent has emerged as an effective peer-to-peer application for digital content distribution in the Internet. However, selecting peers in BitTorrent for efficient content distribution still poses a number of challenges due to high heterogeneities of peers with varied rates of uploading bandwidth and dynamic content. This paper presents GA-BT, a genetic algorithm based peer selection optimization...
A vehicle area network (VAN) is a local area network deployed onboard a moving vehicle, e.g., a train, bus, or a private car, to provide high-speed Internet access to the passengers. A VAN may face temporary network disconnection when the vehicle passes through challenging radio environments, e.g., deep tunnels. Such disconnections disrupt the ongoing network services causing passenger dissatisfaction...
Wi-Max is the fourth generation of high speed broad band internet connection. With a suitable antenna it can cover L.O.S. thirty miles with 5 GHz at the speed of 70 Mbps. It will be available to the public at very low monthly subscription, thus, over riding the high cost of internet connection . The key element for Wi-Max applications is the construction of a proper beam forming antenna. In this article...
The objective of this research was to find out the components and their relationships which effect to Web based transaction processing application maintenance time estimation. Maintenance time indicators were defined from literature review of software maintenance time estimation articles. The 17 maintenance time indicators were used to construct questionnaire. One hundred and forty of public and private...
By examining adjacent steps in a student's solution of an equation or algebraic manipulation, much more information can be deduced than if the final answer alone is examined. We present algorithms for modeling a student's progress in solving a simple equation, used in the author's Webfrog system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.