The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Huge amount of user request data is generated in web-log. Predicting users' future requests based on previously visited pages is important for web page recommendation, reduction of latency, on-line advertising etc. These applications compromise with prediction accuracy and modelling complexity. we propose a Web Navigation Prediction Framework for webpage Recommendation(WNPWR) which creates and generates...
We develop an analytical modeling framework for efficient prediction of cache miss ratios based on reuse distance distributions. The only input needed for our predictions is the reuse distance distribution of a program execution: previous work has shown that they can be obtained with very small overhead by sampling from native executions. This should be contrasted with previous approaches that base...
Land Use-Cover Change (LUCC) is one of the important factors that influence the global environment. In an effort to find out and understand the phenomenon of land change among others, can be approached through land cover change modeling. This model can be used as a tool to support the analysis about the causes of land cover change and its' consequences, to find out and understand the functions of...
Due to the rapid and continuous development of computer networks, more and more intrusion detection techniques are proposed to protect our systems. However, there is a weak anomaly detection problem among the existing system call based intrusion detection systems: the pattern value range of abnormal system call sequences generated by attacks always overlaps to that by normal behaviors so it is difficult...
Due to the rapid and continuous increase of network intrusion, the need of protecting our systems becomes more and more compelling. In many situations, there exists a weak anomaly signal detection problem: due to the little number of anomalous system calls, the anomalous patterns of some intrusions may not be enough to distinguish themselves from normal activities so the existing anomaly detection...
Various Markov models have been proposed to model individuals' mobility, i.e., the transitions between locations. Although these studies are able to show high predicting accuracy of individuals' next move, two basic assumptions of these studies, namely the stationarity of individuals' mobility sequence and the dependency of visiting the locations, have never been validated. Moreover, a famous recent...
Users around the world have embraced new generation of mobile devices such as the smartphones at a remarkable rate. These devices are equipped with powerful communication and computation capabilities and they enable a wide range of exciting location-based services, e.g., location based ads, content prefetching etc. Many of these services can benefit from a better understanding of the smartphone user...
Channel prediction, which predicts a future channel gain based on current and past observations, is very useful for power control and resource optimization in wireless communication systems. However, a low-complexity predictor with trustworthy prediction accuracy is yet to be developed. This paper proposes a linear predictor and two linear Markov predictors, which achieve a good balance between complexity...
The tremendous progress of the internet and the World Wide Web in the recent era has emphasized the requirement for reducing the latency at the client or the user end. In general, caching and prefetching techniques are used to reduce the delay experienced by the user while waiting to get the web page from the remote web server. The present paper attempts to solve the problem of predicting the next...
A conventional grey Markov model will produce large errors when it's used for the prediction of a sequence with large volatility. These errors can lead to prediction failure. So it is necessary to improve the model. In order to reduce the volatility, the logarithm of the original sequence is firstly calculated, and then the minimum error is used to replace the relative error of the grey model. After...
The arrival of new devices and techniques has brought tracking out of the investigation stage and into the wider world. Using Wi-Fi signals is an attractive and reasonably affordable option to deal with the currently unsolved problem of widespread tracking in an indoor environment. Here we present a system called HABITS (History Aware Based Indoor Tracking System) which aims at overcoming weaknesses...
With the emergence of energy crisis and environmental pollution, the large scale photovoltaic power systems have been widely applied. However, the output power of photovoltaic power system has the property of uncertainties. In order to lighten the adverse influence for power grid, this paper attempts a method based on Grey combination model to forecast the short-term power output of a PV power system...
According to the affect of short-term traffic-flow in the Force's optimal maneuver route choice, this paper primarily analyzed the short-term traffic flow forecast arithmetic, and then selected one combined forecast arithmetic based on the Grey Theory and Markov Chain. After forecasted one major road's short-term traffic-flow and implemented in one example, it indicated that the combined arithmetic...
Mobility pattern of device users plays a crucial role in a wide range of mobile computing applications, including data forwarding, content sharing, information search and advertising. Hence, it is important to characterize the mobility path information of users, so as to accurately predict user mobility. In this paper, we introduce two typical user mobility patterns: standard Markov and semi-Markov...
Cooking activities are complex activities consisting of multiple steps or tasks. These tasks can be associated with one another based on two properties the temporal structure that defines the sequence of occurrence of tasks and the objects that are used in the activity. This paper develops cooking activity models for the purpose of task prediction based on these two properties. The temporal structure...
World Wide Web is growing rapidly. So it is necessary to study the user web navigation behavior to improve the quality of web services, offered to the web user. Analysis of user web navigation behavior is achieved through modeling web navigation history. Markov model is widely used to model the user web navigation sessions. Lower-order Markov model provides high coverage, but with low accuracy. Higher-order...
In the process of land use change modeling with CA-Markov model, data source is a crucial factor for the accuracy of the model. The existing research of CA_Markov usually utilized the remote sensing image as data source, and modeling outcome has been affected by many factors such as the remote-sensing imagery interpretation errors. Therefore, this article adopted the land use vector data of Changping...
Distribution demand forecast is one of the core of the logistics system planning. In this paper, to forecast distribution demand, a Grey Markov Model is presented by means of combining Grey system theory with dispersed Markov Chains theory. The model overcomes the influence of random fluctuation data on forecasting precision and widens the application scope of the grey forecasting. Results show that...
As computer systems become increasingly complex, system anomalies have become major concerns in system management. In this paper, we present a comprehensive measurement study to quantify the predictability of different system anomalies. Online anomaly prediction allows the system to foresee impending anomalies so as to take proper actions to mitigate anomaly impact. Our anomaly prediction approach...
The bit error and packet loss in unreliable channels such as Internet and wireless networks lead the quality of video data unacceptable, which force us to take the network adaptive transmission into account. In this paper, we firstly propose a novel Greedy Spread (GS) ROI extraction method to extract ROI effectively, and then the network state changing is quickly perceived without occupying additional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.