The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network virtualization is an important technique to allow multiple customized networks to cohabit on a shared substrate network. In order to put the network virtualization into practice, the virtual network embedding (VNE) problem that searching an efficient mapping of a virtual network request onto substrate network resources should be solved primarily. Since the VNE problem is known to be NP-hard,...
The purpose of the present work is creating an intelligent system to retrieve desired documents in Marathi language. The system also focuses on providing the personalized documents in Marathi language to the end user based on their interests identified from the browsing history. This paper presents the automatic categorization of Marathi documents and the literature survey of the related work done...
In this paper we propose an efficient scheme for supporting multi-path based in-network content caching by leveraging Loop-Free Alternate (LFA) in IP routing. The purpose is to enable clustered distribution of cached content chunks at en-route routers between the content source and the requester. In order to achieve caching localization, we also introduce policies that limit the maximum allowable...
Knowing the geolocation of a router can help to predict the geolocation of an Internet user, which is important for local advertising, fraud detection, and geo-fencing applications. For example, the geolocation of the last router on the path to a user is a reasonable guess for the user's geolocation. Current methods for geolocating a router are based on parsing a router's name to find geographic hints...
The incredible growth of the internet use for all kinds of businesses has generated at the same time an increase of fraudulent activities, which calls for developing new methods and tools for detecting fraud and other crimes against banks and customers. Fraud detection needs to analyze and link data, which are gathered from heterogeneous data repositories, and to address problem solving algorithms...
In order to enhance the service quality of network community, satisfy the growing demand of community users, this paper analyzes the content of network community from different aspects and provides a comprehensive method to divide the network community user group. On one hand, this method use link analysis techniques to study hyperlink, calculate the number of output links and input links, and then...
The recent years have seen extensive work on statistics-based network traffic classification using machine learning (ML) techniques. In the particular scenario of learning from unlabeled traffic data, some classic unsupervised clustering algorithms (e.g. K-Means and EM) have been applied but the reported results are unsatisfactory in terms of low accuracy. This paper presents a novel approach for...
Content delivery networks have emerged to conquer massive requests problem in popular web services. One of the major issues in CDNs is the replica server placement problem. If the replica servers are geographically closer to the users, overall bandwidth consumption and the users' perceived latency will be reduced significantly. In this paper we have used IP geolocation services to achieve the users'...
In this paper, we examine the significance of expansion of the user query by two techniques namely Efficient Clustering-By-Direction and Theme Clustering. These two techniques produce the clusters of keywords extracted from the set of retrieved documents for the user query. The former clustering is based on statistical approach whereas the latter clustering is based on semantic approach. Empirical...
Reputation mechanisms are widely used in online networks to rank users or products, but despite their importance, very few studies have been done or published on their real behavior. In this paper, we study an Internet-deployed distributed reputation mechanism called BarterCast that is specifically designed for peer-to-peer file-sharing systems. The BarterCast mechanism is based on building a weighted...
Measures of graph similarity have a broad range of applications but involve compute-intensive process. Similarity flooding algorithm is an efficient algorithm for comparing the similarity of graphs of small size and small datasets. However, nowadays more and more large-scale graph applications emerge and existing stand-alone similarity flooding algorithm cannot efficiently conduct the similarity comparison...
Topic detection is an hot research in the area of information retrieval. However, the new environment of Internet, the content of which are usually user-generated, asks for new requirements and brings new challenges. Topic detection has to resolve the problem of its lower quality and large amount of noisy. This paper not only provides a solution for detecting hot topics, but also giving its semantic...
Twitter is one of the most popular microblogging services that lets users post short text called Tweet. Tweet is distinguished from conventional text data in that it is typically composed of short and informal message, and it makes typical text analysis methods do not work well. Accordingly, extracting meaningful topics from tweets brings up new challenges. In this work, we propose a simple and novel...
With an increasing interest in social media, a large number of Web images have been created on the Internet. Therefore, extracting useful knowledge from a large-scale set of Web images has become a new type of challenge. In this paper, we focus on Web images that have been posted onto the Internet through social media sites. The main objective of this study is to extract the events and track the topics...
Many applications based on internet need to use the large-scale data delivery mechanism. How to obtain the better delivery performance with the limited network resources has become a "hot spot" in the research community of network information flow. This paper put forward a low cost network coding algorithm based on the key link and its distribution implementation. When construct the transmission...
During the last two years so-called free-floating Car Sharing Systems became very popular. These systems in comparison to the conventional Car Sharing Systems allow short one-way trips. Today, the spatial distribution of vehicles within free-floating Car Sharing Systems is either self-organized, which means it is only dependent on the customer's demand or in a few cases the positioning is manually...
with the remarkable innovations on network infrastructures, new features of the internet users' behaviors are emerging. Researchers used to analyze the users' log on-line data with statistics and clustering to find out valuable time preference patterns. However, the traditional method to define distance between users would either neglect relevance of time series or lead to high-dimensional crisis...
Early Internet architecture design goals did not put security as a high priority. However, today Internet security is a quickly growing concern. The prevalence of Internet attacks has increased significantly, but still the challenge of detecting such attacks generally falls on the end hosts and service providers, requiring system administrators to detect and block attacks on their own. In particular,...
Micro-blog is one of the internet applications, and it is newly developed online communication platform to achieve real-time information sharing. Micro-blog becomes quite popular. We analysis the researched approach of detecting hot topic, combine with a variety of related parameters of hot topic, and implement the detection of hot topic through Micro-blog. This paper presents a hot topic detection...
This paper proposes the recommendation system which is a new method using k-means clustering of item category based on RFM(Recency, Frequency, Monetary) in u-commerce under ubiquitous computing environment which is required by real time accessibility and agility. In this paper, using a implicit method without onerous question and answer to the users, not used user's profile for rating to reduce customers'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.