The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart phones are ubiquitous nowadays and have taken over the bulk data transfers in mobile networks. The next generation phones are even more powerful to handle voice, video and data catering real time multimedia experience. Unfortunately, the increase in service provider capacity has not kept up with the user demand for more bandwidth. It is becoming very expensive for service providers to cater...
WWW is a huge collection of information and most of the time people are engaged with it in order to retrieve different types of information. People want to get accurate and appropriate data at the top of search results in a user friendly manner. People also want to get a personal space over the internet when they are browsing on web, from this arises a need of personalization of the search history...
The main contribution of this paper is an end-to-end rate-based congestion control algorithm for unicast quality adaptive video streaming that we call Adaptive Rate Control (ARC). The algorithm is based on end-to-end estimation of both available bandwidth and queue backlog. ARC has been compared with the TCP-Friendly Rate Control (TFRC) algorithm via the ns-2 simulator. In particular, both single...
Traffic matrix estimation in communication networks is challenging problem, whose solution provides a valuable management and planning tool. Given the range of technologies able to reconfigure the resource assignment, real-time knowledge of the traffic matrix enables smart adaptive traffic management functions. A new perspective is given to the traffic matrix estimation problem by the Software Defined...
Today the U.S. Army is increasingly deploying regionally aligned brigades to new areas of interest while simultaneously placing greater emphasis on engagement, recently adding it to the Warfighting Functions. These regionally aligned forces often conduct engagement in unstable and austere environments with limited understanding of the primary actors. Traditional intelligence collection is often focused...
Today, as the life becomes faster so, it is the demand of time that thing has to be automated. To fulfill this demand a new type communication taking place known as machine type communication. In the near future there will be millions of connections so the problem is how to manage that much connection million machine to machine connections. 3GPP and other organization introduce the various techniques...
Rapidly acceleration in the technological advances throughout the world leads to enormous increase in encrypted Internet traffic. Tremendous progressions and changes are taking place in months rather than in years. From mobility and video to cloud and network programmability, there is no end of vision. Majority of people still believe that computer securely sends the email to the intended recipient...
This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most important symmetric encryption algorithm. The development focuses on the generation of dynamic quantum S-Boxes (DQS-Boxes) based quantum cipher key, instead of the ordinary used static S-Boxes. Moreover, the paper introduces the integration between the developed AES based DQS-Boxes,...
In this paper, we have proposed a novel K-means algorithm with modified Cosine Distance Measure for clustering of large datasets like Wikipedia latest articles and Reuters dataset. We are customizing Cosine Distance Measure for computing similarity between objects for improving cluster quality. Our method will calculate the similarity between objects by Cosine Distance Measure and then try to bring...
Snapshots of the Forwarding Information Base (FIB) in Internet routers can be compressed (or aggregated) to at least half of their original size, as shown by previous studies. However, the permanent stream of updates to the FIB due to routing updates complicates FIB aggregation in practice: keeping a (near-)optimally aggregated FIB in face of these routing updates is algorithmically challenging. A...
Due to ever growing demand for the Internet resources, the Internet is facing ossification problem. Network virtualization is a promising way of supporting multiple heterogeneous networks onto a single substrate physical network offering solution to the problem. However, embedding Virtual Networks (VN) on a Substrate Network (SN) meeting the resource requirements of VNs and resource constraints of...
With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions are done on the internet. When the information is transferred from the sender to the receiver over the internet, it may be eavesdropped by an intruder and thus is a continuous threat...
With the increasing popularization and extensive application of Internet, more and more netizens begin to post their views, opinions and comments on the Internet. The sentiment analysis on these comment texts will become a focus for future research. According to the characteristics of Chinese comment text, a method based on the text sentiment analysis of the focus sentence and context is put forward...
With the continuous development of the Internet technology, nowadays personalized service and recommendation technology have been paid more attentions. The paper aims at accurate user classification for tag application systems and proposes the feasible solution which can mine users' intention in reviews and extend the tag semantics by open knowledge platform. Experiments validate the proposed solution...
Existing personalized recommendation systems are facing many problems such as cold start, data sparseness and high complexity. Users' interests exist more widely and are more personalized compared with purchasing history in traditional recommendation systems. Thus, applying the interest graph in the recommendation process can make up certain shortages. This paper builds the mechanism of a user-interest-goods...
Data compression algorithms are used to reduce the redundancy, storage requirement and efficiently reduce communication costs. Data Encryption is used to protect our data from unauthorized users. Due to the unprecedented explosion in the amount of digital data transmitted via the Internet, it has become necessary to develop a compression algorithm that can effectively use available network bandwidth...
Approximate duplicate-detection (or membership query) in data streams answers the question of whether an element from a large universe U (a query element) is present in a small subsequence of a data stream or not. It is an important query that has many Internet applications, such as web crawling, social networks and so on. Existing approximate duplicatedetection methods in the sliding window model...
System mainly studies mass events found images from the Internet, this paper focuses on the data label document Flickr to quantify. This paper also implements single-pass clustering algorithm using traditional text clustering. In this paper, achieve three strategies of single-pass clustering algorithm, and analyze and compare the three strategies. Different document order in the event of the discovery...
One of the key technologies on the Internet is the DNS protocol. While many studies have taken a statistical approach, the representation of DNS traces as a graph has not received enough attention. In this position paper we present our work of applying Process Mining (PM) techniques to study DNS traffic. Process Mining has been successfully used to understand processes on the enterprise as part of...
The technology of Internet information source discovery on specific topic is the groundwork of information acquisition in current big data era. This paper presents a multi-seeds cocitation algorithm to find new Internet information sources. The proposed algorithm is based on cocitation, but what difference with the traditional algorithms is that we use multiple websites on specific topic as input...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.