The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While there is a large amount of text data on the Internet, people need to organize the text data with experienced category. However, the flat structure of categories could not satisfy the modern information management. To solve this problem, we propose a hierarchical classification process with a strategy, called candidates, used to relieve the blocking problems. Besides, we establish the description...
Large-scale high-capacity communication networks among airborne platforms are quickly becoming a reality. Today, both Google and Facebook are seeking to form networks between high flying balloons and drones in an effort to provide Internet connections from the upper atmosphere to users on the ground. These airborne networks, that will likely use directional communication links between nodes to achieve...
Many scholars would agree that, had it not been for the partition table, the visualization of journaling file syste ms might never have occurred. In this work, we confirm the typical unification of Internet QoS and red-black trees, whi ch embodies the typical principles of hardware and architecture. This at first glance seems counterintuitive but is buffetted by prior work in the field. In order to...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks management. In this paper we propose a novel anomaly detection system, based on a combined use of sketches and of a novel bivariate non-parametric detection method. The latter allows us to simultaneously analyse two different traffic features so as to improve the performance of the "classical" detection...
Device-to-device networks (D2D) underlaying cellular networks have been widely recognized as one of the major approaches for ubiquitous information exchange featuring future Internet of things (IoT). In this paper, we propose an interference-aware routing for wireless D2D networks. Our objective for routing is to minimize the hop-count, which can decrease not only the delay for D2D connections, but...
Positioning capabilities offered in modern mobile devices enable usage of location-based services. Privacy and security is of great importance for related applications. We present a framework that allows conducting research on anonymity techniques in a real-life environment using smartphones. The proposed solution also includes logging mechanisms that facilitate positioning research dataset development...
In Chord protocol of P2P network, distances between entries in routing table are too long and only half of the identifier space can be covered. To solve this problem, a higher order Chord routing algorithm is proposed. The algorithm presents a new structure formula for routing table, increases distribution density of routing table entries, and extends routing searching coverage areas to the entire...
This work presents the design and development of a web-based system that supports cross-language similarity analysis and plagiarism detection. A suspicious document dq in a language Lq is to be submitted to the system via a PHP web-based interface. The system will accept the text through either uploading or pasting it directly to a text-area. In order to lighten large texts and provide an ideal set...
With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on real time considerations, these new applications mostly use UDP as transport layer protocol, which directly increase UDP traffic. However, traditional studies believe that TCP dominates the Internet traffic and previous traffic measurements...
The anti-collision problem is one of the difficulties of RFID in IOT. In the IOT system, there may be more than one tag in the working range of one reader. When the reader start these tags, all of them will transmit data to the reader at the same time, it will cause the reader can not read the data from the tags correctly. Use the anti-collision technology the IOT can prevent multiple tags simultaneously...
Now botnets have become the great threat of Internet Security. To be well prepared for future attacks, it is not enough to study how to defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be developed in the near future. In this paper, we present the improved design of an advanced hybrid P2P routing algorithm. The first method...
A new multi-paths routing algorithm has been proposed in this paper, which can solve the problem of congestion caused by overloads of links and provide a better environment compared with the traditional networking technologies. This methodology will call the routing mechanism when the links appear overloads, and it can adopt alternative path or multi-paths to complete data transmission to reduce congestion...
With the rapid development of search engine technology, the technology of focused crawler has been widely concerned and deeply researched. In this research field, there is a "tunnel phenomenon" seriously affecting the crawler's efficiency and coverage. This paper proposes a simple algorithm on correlation calculation and a good method on dynamic adjustment of the threshold, which can effectively...
Session identification is an important step in data processing of web log mining. To solve the defects in traditional session identification, an improved session identification algorithm was proposed. After identifying specific users, a great deal of frame pages were filtered, the relatively reasonable access time threshold for each page was made up according to contents of each page and all web structure...
Enabling efficient retrieval and re-usage of digital documents is a major challenge as many documents on the Internet and on Intranets are poorly described with metadata. Manual generation of quality metadata requires skilled human resources, is costly and time-consuming. As a result, metadata related to the documents are too often insufficient or even incorrect. Automatic Metadata Generation (AMG)...
Concepts of network virtualization and overlays are nowadays gaining much popularity and are perceived as key approaches for future Internet. One of possible applications used in overlay networks is live streaming based on Peer-to-Peer (P2P) multicasting. This paper deals with the problem of overlay networks dimensioning. In the problem-formulated as an Integer Program - access link capacities are...
Duplicate detection, which is an important subtask of data cleaning, is the task of identifying multiple representations of a same real-world object and necessary to improve data quality. Numerous approaches both for relational and XML data exist. As XML becomes increasingly popular for data exchange and data publishing on the Web, algorithms to detect duplicates in XML documents are required. Previous...
Web services are self-describing, platform independent applications that can be accessed over the Internet. Web services enable us to dynamically find, bind and consume the needed functionality. Semantic Web services are being developed with the vision of automating this process and to facilitate interoperable machine to machine interaction with no/minimal human intervention. Semantic descriptions...
Multi-agent system (MAS) is considered as a branch of distributed systems which has many applications such as e-commerce, transportation system, Web application, and air traffic control. Packet world problem is MAS application used in this research to study the cooperation interaction between agents. This research aims to prove that using cooperative MAS algorithm will solve packet world problem in...
Information on the Web has become a production factor. Author of a unique text is unaware of its download, assessment, revision or reuse. At this juncture authorship management becomes a serious issue for digital text. To handle this issue information of the original author must be hidden in the text itself by natural language watermarking. Authorship is protected by linguistically modifying a given...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.