The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A solution to evaluate network workload by data fusion is put forward, which can be for surveillance the traffic of interconnected communications network in order to keep the network working well by identifying potentially serious problems in the early stages and evaluating network performance. Through fusing the historic network traffic data and network online traffic data, which is based on least...
Traffic measurements from communication networks have shown that network traffic is exhibiting self similar as well as long range dependence properties. In telecommunication networks, congestion events tend to persist, producing large delays and packet loss resulting in performance degradation. In order to guarantee quality of service to diverse Internet services, congestion prediction became a fundamental...
Rank aggregation is the problem of generating a single consensus ranking for a given set of rankings. Rough set based Rank aggregation is a user feedback based technique for rank aggregation, which learns ranking rules using rough set theory. In this paper, we discuss an improved version of the rough set based rank aggregation technique, which is more suitable for aggregation of different Web search...
The topic correlation judgment algorithm based on weight and threshold is proposed as for the problem that Web pages which are closely related to the given topic may be neglected due to not all keywords given by the users in the pages when users retrieve the topic they desire on the Internet. The algorithm retrieves the topic on the Web sites in depth by the hierarchical key structure on the basis...
The discovery of the batch renewal process (BRP) provides means to investigate the effect of traffic correlation independent of any other traffic characteristics. BRP is considered to be the least-biased choice traffic model, given only the measures of correlation, because the BRP is completely determined by the complete (infinitely denumerable) sets of count correlation and of interval correlation...
Web search query logs contain valuable information which can be utilized for personalization and improvement of search engine performance. The aim in this paper is to cluster users based on their interests, and analyze the temporal dynamics of these clusters. In the proposed approach, we first apply clustering techniques to group similar users with respect to their web searches. Anticipating that...
In this paper, we propose a set of semantic cohesion metrics for ontology measurement, which can be used to assess the quality of evolving ontologies in the context of dynamic and changing Web. We argue that these metrics are stable and can be used to measure ontology semantics rather than ontology structures. Measuring ontology quality with semantic inconsistencies caused by ontology evolutions,...
Nowadays, more and more singers published various songs. There are about 50,000 songs in the Internet. The songs are refreshed everyday, so we need a real-time chart of music. In this paper, our study is based on the real-time search charts of music. We studied the algorithm of the charts and analyzed the ranking of the charts. According to the ranking of the charts, we got some special characters...
How to judge the relationship between mobile short messages is the key technology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of different SMS topic feature words is analyzed. Then a computing method of the association degree between different SMS feature words is proposed, which is based on leverage formula....
In this paper, we propose a method to simulate the aggregated traffic of a number of homogeneous on-off traffic sources by a reduced equivalent set that will produce the same traffic characteristics. On-Off traffic source models are used extensively to model the source traffic in the Internet. However, when traffic from a large number of sources is to be simulated, it becomes computationally prohibitive...
The use of sophisticated techniques is essential to detect and identify the presence of botnet flows, but these techniques can be expensive in computational and memory resources. A critical first pass is to filter out all traffic that is highly unlikely to be part of a botnet, allowing the more complex algorithms to run over a much smaller set of flows. This paper presents our studies and experience...
The peer-to-peer (P2P) networks is heavily used for content distribution applications and are becoming increasingly popular for Internet file sharing. Generally the download of a file can take from minutes up to several hours depending on the level of network congestion or the service capacity fluctuation. In this paper, we consider two major factors that have significant impact on average download...
An important issue when evaluating a search tool is the satisfaction that is expressed by its users. While there are many factors that affect satisfaction, we believe that users' expectations affect their evaluation of a query's response, and in turn, their satisfaction. We validate this perspective by measuring individuals' expectation, judgement of response quality, and overall satisfaction for...
For Internet based real-time teleoperation systems, unknown and variable time delay can cause instability in the closed loop control system and hence hinder task accomplishment. According to requirement of Internet-based teleoperation, exact prediction of RTT can improve greatly performance of the teleoperation system. In this paper, statistical properties of the Round Trip Timedelay (RTT) are investigated...
The purpose of this study is to examine the differences of group learning (GL) in the classroom-based and the Web-based environments through factor analysis. Our previous study has already identified 62 influencing factors of a GL process according to the content analysis from the literature. 276 teachers participated in a well-structured questionnaire survey and the data were analyzed by SPSS. Four...
The peer-to-peer (P2P) networks is heavily used for content distribution applications and are becoming increasingly popular for Internet file sharing. Generally the download of a file can take from minutes up to several hours depending on the level of network congestion or the service capacity fluctuation. In this paper, we consider two major factors that have significant impact on average download...
Stepping stone detection can be defined as a process to discover an intermediate host correlation that used by intruder. Most of the intruders cover their track by login into intermediate host first before execute the real attack. This intermediate hosts here known as stepping stone. This paper introduces a hybrid stepping stone detection method which combines the network-based and host-based stepping...
With the development of high rate data transmission technology via distribution line communication, the electric power, data, voice and video can be transferred in the same electric power distribution network, and the technology will be put in operation widely in the future. However the traditional technology of power line communication is not adaptable to the complex and harsh environment of distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.