The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
LBP (Local Binary Pattern) is a commonly used operator to extract LBPH (LBP histogram) of an image for local texture description. For gender classification, we proposed an innovative method by extracting multi-scale LBPH in DoG (Difference of Gaussian) space in this paper. Given a facial image, we firstly preprocess it meticulously to avert the local variations of images which probably be caused by...
Robust BaseLine (RBL) is a formal technique for extracting the baseline of network traffic to capture the underlying traffic trend. A range of applications such as anomaly detection and load balancing rely on baseline estimation. Once the fundamental period of the pattern for analysis is recognized, e.g., based on user interest or a period detector such as Autocorrelation Function (ACF), the basic...
It is a major aspect of social network analysis to apply data mining techniques to analyze relationship pattern and reveal social phenomena. And the analysis of attack-resistance of national economy is critical to a country and her people's livelihood. Previous studies of attack resistance of social network mainly focus on analyzing the attack effect on the network's connectivity, when a few nodes...
In this paper, a novel approach is presented to solve the problems of dynamic data mining(DM) such as low effectiveness, high randomness and hard implementation. With the extension of the concept data mining process, the evolutionary and immune characteristics in dynamic mining are first illustrated respectively, based on the facts of the relationship between data mining tasks and the global optimization...
Commercial tuple extraction systems have enjoyed some success to extract tuples by regarding HTML pages as tree structures and exploiting XPath queries to find attributes of tuples in the HTML pages. However, such systems would be vulnerable to small changes on the web pages. In this paper, we propose a robust tuple extraction system which utilizes spatial relationships among elements rather than...
Collaborative filtering algorithms are successfully used in personalized recommender systems for their simplicity and high recommending quality. However, significant vulnerabilities have recently been identified in collaborative filtering recommender systems. Malicious users can inject a large number of biased profiles into such a system in order to make recommendations that favor or disfavor given...
The rapid development of Internet facilitate the acquisition, transmission and exchange of digital data. The semantic Web aims at defining ways to allow Web information to be used by computers not only for display purposes, but also for interoperability and integration between systems and applications. Web ontology language (OWL) is recommend by W3C for semantic Web ontology building. Unauthorized...
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded its functionality, and became the basis for commercial, infrastructure, and home systems, vulnerabilities in the system affected its robustness and security. This paper presents a brief history of UNIX vulnerabilities, beginning...
Active Queue Management (AQM) can potentially reduce packet loss rate in the Internet. This is used by routers for control congestion, where packets are dropped before queues become full. In this paper, a new framework of AQM, namely NEWQUE active queue management algorithm supporting explicit congestion notification (ECN), is proposed. The objective of the new algorithm is to improve performance...
Real time network applications require effective mechanisms for managing Internet traffic in order to avoid or at least limit the level of congestion. We propose, design and analyze an Active Queue Manager (AQM) for controlling jitter using robust control theory. We used an output feedback controller and this controller is based on discrete-time model of TCP. The natural properties of robust controller...
Information on the Web has become a production factor. Author of a unique text is unaware of its download, assessment, revision or reuse. At this juncture authorship management becomes a serious issue for digital text. To handle this issue information of the original author must be hidden in the text itself by natural language watermarking. Authorship is protected by linguistically modifying a given...
In social network, more and more video websites were appeared around the world, and everyone can upload or download the media freely. Therefore, it brings some content security problems, such as piracy, sensitive contents' disclosure and so on. This paper proposes a system to detect the media which is prepare to be uploaded. First we should initialize a Media Feature Database (MFD) which contains...
In order to accurately simulate real networks, we present a self-organized network model with local world and find some nontrivial features. Nodal fitness of the model has a uniform distribution and power-law tail above critical value, its nodal degree distribution has a power-law behavior similar with nodal fitness when nodal degree is larger than local world size M. Further numerical results demonstrate...
Today, overlay networks are used as a promising platform to deploy wide area of applications and services in the Internet. The application level state maintained by the overlay networks should have high degree of availability.This can be compromised when a significant percentage of overlay nodes fails simultaneously (massive failure). The first problem: when a significant fraction of nodes fails simultaneously...
With the progresses of the Internet, many import documents can be found online. It is vital to protect the safety and genuineness of the seals in the published documents. In this paper, a fragile watermarking scheme is proposed to extract the features from the original documents and then combine them with some confidential parameters to generate watermarked unique seals from the official seals without...
To satisfy users in specific area, topic-specific Web crawler is becoming more and more popular in the Web data mining and searching with Internet growing exponentially. Meanwhile, a few peer-to-peer based Web search engines are proposed to cope with problems like single point of failure of current centralized architecture crawlers. Relevance of topic has been deeply studied while selection of starting...
Network coordinate (NC) which provides efficient distance prediction with scalable measurements, brings benefits to various network applications. Phoenix Network Coordinate system is a recently proposed dot product based NC system with high prediction accuracy and better robustness. In this paper, we discuss the neighbor selection policies for Phoenix and propose a modified Phoenix with hybrid neighbor...
Currently new sophisticated services such as IPTV, conference communications, network gaming, etc. need group communication capability in the network. However, current Internet does not provide full deployment of multicast capability. Therefore, alternative solutions are needed to provide efficient group communications. One such solution is an overlay multicast mechanisms. Membership management is...
Watermarking is a potential method for copyright protection and multimedia data authentication in the Internet. The watermarking process can be considered as a communication task, where the watermarking acting like information embedded into a host image, which acts like noise in a communication channel susceptible to all kinds of attacks acting like as jamming. In this paper, a novel watermarking...
Swarming peer-to-peer systems play an increasingly instrumental role in Internet content distribution. It is therefore important to better understand how these systems behave in practice. Recent research efforts have looked at various protocol parameters and have measured how they affect system performance and robustness. However, the importance of the strategy based on which peers establish connections...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.