The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sentiment analysis is one of the most popular natural language processing techniques. It aims to identify the sentiment polarity (positive, negative, neutral or mixed) within a given text. The proper lexicon knowledge is very important for the lexicon-based sentiment analysis methods since they hinge on using the polarity of the lexical item to determine a text's sentiment polarity. However, it is...
Outlier detection is an important research problem in data mining and image analysis. In this paper, the ideas in the PageRank algorithm are borrowed to construct a novel outlier detection method. In this method, three detecting stages are performed to detect three different types of outliers by using different detecting strategies. The whole process is called tri-stage detection. Effectiveness of...
Efficient retrieval of traffic archival data is a must-have technique to detect network attacks, such as APT(advanced persistent threat) attack. In order to take insight from Internet traffic, the bitmap index is increasingly used for efficiently querying over large datasets. However, a raw bitmap index leads to high space consumption and overhead on loading indexes. Various bitmap index compression...
The urban road traffic congestion is becoming a serious problem. The number of vehicles waiting to be processed at the intersection is rising sharply with the increase of the traffic flow, and it cannot be effectively scheduled by the traditional traffic lights. A real-time vehicle scheduling algorithm based on the traffic flow to improve the vehicle scheduling ability of the intersection and reduce...
Recent years have brought the burst of volume of shared opinionated texts across the internet. Every day, a tremendous number of comments and reviews towards different aspects of our lives is generated through social networks and other websites. A large portion of these data is written in Arabic which is the fifth most used language on internet [1] and is one of the six official languages of the United...
Energy efficient networking has gained momentum in past one decade due to the Internet's ever increasing share in world's total energy consumption. It is crucial to study and reduce the energy consumption of tasks that are very heavily used in the Internet. In this paper, we focus on one such task, file distribution, and study its energy efficiency. We prove lower bounds on energy consumption for...
The share of video streaming in the Internet traffic is expected to reach 80% by 2019. To deliver these video services in possibly strained settings and to meet with the users requirement of anywhere and multi-screen experience, HTTP Adaptive Streaming (HAS) is gaining momentum. However, TCP-transport of HAS flows is known to entail a number of issues both on Quality of Experience (QoE) and network...
In the era of the Big Data, cache is regarded as one of the most effective technique to improve the performance of accessing data. The majority of caches save each query result as a file, thus it is difficult to reuse the data from parts of some query results in the cache, and consequently some cached data were wasted. Through studying domestic and foreign related technologies, this paper designs...
When using Information Retrieval (IR) systems, users often present search queries made of ad-hoc keywords. It is then up to the information retrieval systems (IRS) to obtain a precise representation of the user's information need and the context (preferences) of the information. To address this problem, we investigate optimization of IRS to individual information needs in order of relevance. The goal...
The main problem considered in this paper is creating algorithms for estimation the relevance of documents to the search query on the basis of sentences structure analysis. To decide this problem, we use the relations between words constructed by the program system Link Grammar Parser, based on the so-called link grammar. There were suggested the natural system of links for Turkic languages, created...
Botnets are one of the most serious threats in the Internet, and thus the effective detection of the botnet becomes more and more important. In this paper, inspired by IP tracing technology, we propose a novel botnet detection method that can analyze the data packets, based on graph structure clustering. This method analyzes the comprehensive information of packages content and timestamp flow. Such...
The conception of the pseudonondeterministic cryptography is considered. Multiplied data-driven pseudonondeterministic hash constructions, which provide infeasibility increasing against generic attacks based on the multicollision designing, were proposed. The estimations of the infeasibility increasing were presented. The instances of the data-driven pseudonondeterministic hashing methods, which could...
Nowadays CLARA (Latin Americas Consortium for Advanced Networks) is partially stagnated with no grow since last update in 2013, with this review we hope in a near future offer a new proposal for updating and reactivation of advanced networks in Latin America. A step by step simulation was developed in order to get first approach to how CLARA works; then a step by step emulation was developed with...
With the growing scale of the Internet, the amount of data is increasing rapidly as well. In order to improve the user experience, the recommendation system came into being. It recommends products to the user by analyzing the user's behavior. In the recommendation system, collaborative filtering algorithm is one of the most widely used algorithms. While the traditional collaborative filtering is no...
Today's Internet suffers from a very complex problem-congestion. It is one of the top-ten listed fundamentally important problems in networking. It causes many important data to be lost. Wastage of network resources results from this. It makes the network easily become gridlocked, with little or no data being transported end-to-end. To protect data transfer from this problem various models of TCP...
Wikipedia is an online encyclopedia which contains millions of articles related to different subject domains. Wikipedia also has a search page itself to display the links corresponding to Wikipedia articles for a given user query input. This search result page displays the search results according to the relevance order, without any content based grouping. This paper presents an experimental deduction...
Data stream is relatively new and emerging domain in the current era of Internet advancement. Clustering data streams is equally important and difficult because of the numerous hurdles attached to it. A number of algorithms have been proposed to offer solutions for efficient clustering. Grid-based clustering approach was adopted few years ago to overcome the limitations of conventional partition-based...
The thousands of streaming data overwhelmingly provide for Internet users on Twitter every day, especially for those Twitter users with many friends. However, the useful tweets that users are really interested in personally could be covered by massive other uninformative and uninteresting information. Therefore, how to bring immediately the interesting tweets for users is always a challenging issue...
Nowadays, online social network has become one of the main tools which people communicate with each other every day. The online users' behavior is a large amount of high dimension data. However, is online and offline behavior the mapping relation? This paper explores whether there is consistency between online and offline behavior using the Alternating Direction Method of Multipliers (ADMM) algorithm...
With the rise of the three course provider including Coursera, Udacity and edX in US in 2012, massive open online courses(MOOC), as a new mode of education, boomed a wave of online higher education and swept quickly across the world. MOOC platforms, with a wide range of audience, high quality of curriculum, flexible teaching methods and rich teaching resources, are more and more popular in students...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.