The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IOT (Internet of Things) is a global network infrastructure, linking physical and virtual objects through the exploitation of data capture and communication capabilities. The Soft Spread Spectrum (M-ary Spread Spectrum) has not only strong anti-interference ability of conventional Spread Spectrum, but also high bandwidth utilization of M-ary modulation. What's more, it has lower probability of...
The influence of the negative spillover effect on the different strategies of sales promotion was studied by game theory in dual-channel under Internet environment. The equilibrium results of uniform strategy and non-uniform strategy were analyzed and compared with the integrated decision mode according to the difference of strategies. Combined with the numerical example, the analytical results show...
Identifying review manipulation has become one of hot research issues in e-commerce because more and more customers make their purchase decisions based on some personal comments from virtual communities and e-business websites. Customers consider these personal reviews are more reliable than the existing internet advertisements. Consequently, some enterprises attempt to create fake personal comments...
Internet random time delay constitutes a major challenge for Internet-based teleoperation systems. Since the uncertain time delay may degrade the system performance, and even lead to instability. Although large-scale research works have been conducted on the understanding, testing, and analysis of Internet round trip time delay (RTT), it is not appropriate to use RTT in control methods design. It...
The popularization of the Internet provide people with more quick and direct access to information channel, the network search data record the netizens' tens of thousands of search concerns and needs to provide the necessary data base for the research of social and economic behavior. Search behaviors' anonymity just can meet the venereal-disease suspected patients' privacy need. This paper will use...
The signals released by the online retailer can influence the consumers' trust in the retailer, and then, make an impact on consumer's purchase intention. This research will directly examine the effect of trust signals on online retailers' sales. The data are collected from Taobao (www.taobao.com), and contain 400 samples unit with product and four categories. With linear regression model, this research...
The stock discussion board is becoming an important public forum because of its fast speed, wide influence, large amount of information and high group pertinence. The bloom in the stock discussion board exerts a positive influence on the stock market. This paper sets the amount of posting on stock discussion board as a proxy of information flows. And after the empirical analysis of sample data, we...
Discovering temporal patterns and changes in tobacco use has important practical implications in tobacco control. This paper presents one of the first comprehensive international studies of seasonal smoking patterns based on online searches performed. Using periodogram and cross-correlation, we find that smoking-related search behavior shows strong seasonality effect across countries. In addition,...
Researchers tend to agree that an increasing quantity of data has caused the complexity and difficulty for information discovery, management and reuse. An essential factor relates to the increasing channels for information sharing. Finding information, especially those meaningful or useful one, that meets ultimate task of user becomes harder then it is used to be. In this research, issues concerning...
As a free online encyclopedia with a large-scale of knowledge coverage, rich semantic information and quick update speed, Wikipedia brings new ideas to measure semantic correlation. In this paper, we present a new method for measuring the semantic correlation between words by mining rich semantic information that exists in Wikipedia. Unlike the previous methods that calculate semantic relatedness...
This paper considers fundamental measurements which drive TCP flows: throughput, RTT and loss. It is clear that throughput is, in some sense, a function of both RTT and loss. In their seminal paper Padyhe et al [1] begin with a mathematical model of the TCP sliding window evolution process and come up with an equation showing that TCP throughput is (roughly) proportional to 1/RTT√p where p is the...
The focus of this paper is to characterize the behavior of large, evolving networks, in terms of central nodes to identify patterns that may be conducive to persistent threat structures over time and geo-spatial regions. We propose an approach to monitor central nodes to determine Consistency and Inconsistency (CoIn) in their availability across time periods. Our approach also identifies the time...
This study integrated theory of planning behavior (TPB) and technology acceptance model (TAM) to investigate the determinants affecting taxpayers' on-line tax filing. According to the Global e-Government Study of Brown University in the United States, Taiwan's ranking was the world's first in 2010. Hence, this study sampled 422 online taxpayers in Taiwan and questionnaire-based empirical study was...
Autonomous Systems (AS) exist and co-exist in two parallel dimensions. In one dimension they are physical networks, whose interconnections are necessary to ensure global Internet reachabilty. In the other dimension, ASes are large well-known companies competing in the same industry. In this paper we bridge together these dimensions by investigating synchronous cross correlations of stock market data...
How do people use phone calls and text messages for their communication needs? Most studies so far study each mode of communication in isolation. Here, we study the interplay of multi-modal communications. We analyze more than a billion call and text records from a Chinese city and San Francisco Area between 2007 and 2011. First, we provide some definitions towards a framework for analyzing multi-modal...
Internet threat monitoring systems are studied and developed to comprehend the malicious activities on the Internet. On the other hand, it is known that attackers devise a technique that locates the deployment of sensors that constitute the monitoring system. This technique is called as localization attacks to Internet threat monitors. If attackers can detect sensors, they can evade them when they...
The influence of social networks, Facebook especially, and on student population are often subject to various investigations. The analysis of the interdependence between the values that determine trends in the use of social networks in the student population is possible to determine the impact of social networks on students' evaluation and results. The starting assumption implies better performance...
High schools have rapidly adapted computers in their administration, management and academy. School management uses papers and computers as tools to store the administrative and management data. However computers are not used to analyze data and output information. Therefore, e-School Management System (e-SMS) is developed to facilitate teaching and administration staffs to manage school activities...
Self-service technologies appeal to service providers because they can standardize service delivery, reduce labor and service costs, and reach new consumers who are unreachable through the bricks-and-mortar channels. Our focus in this paper is on Internet banking. Scholars have proposed a variety of different models to explain the factors affecting Internet banking initial use intention formation...
Given an attributed graph representation of data, vertex nomination works to find the group of vertices which are of interest, e.g., those vertices whose attributes are different from others', or the connection among those vertices are more frequent. In this paper we present an algorithm to estimate the power of nominating these interesting vertices. This algorithm is based on Wilcoxon rank sum test...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.