The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasing popularity of social media, the Sentiment Analysis (SA) of the Microblog has raised as a new research topic. In this paper, we present WDCRF: a Word2vec and Dynamic Conditional Random Field (DCRF) based framework for Sentiment Analysis of Chinese Microblog. Our contributions include: firstly, to address drawbacks of Microblog message such as the length and Lexicon limitations,...
Radio Frequency Identification (RFID) technology is a contactless automatic identification technology. With the wide application of this technology in many fields, anti-collision algorithm to solve the problem of multi-tag identification becomes more and more important. The current RFID anti-collision algorithm is mainly divided into two categories: ALOHA based algorithm and tree based algorithm....
In the recent years, due to the prevalence of 3D printers, there have been many applications of 3D printing developed for education such as creating custom-made teaching aids or student art work. Although there are web sites hosting 3D models created by students and allowing them to share and search in the database, these systems usually lack functions of collaborative learning. On the other hand,...
This paper puts forward a way to design and realize a teaching quality evaluation system for part-time teachers. Through the evaluation of part-time teachers in the teaching process, the quantitative evaluation results of the teaching quality of the course can be gained on the basis of analytic hierarchy process to carry on the distribution of evaluation index weights, fuzzy comprehensive evaluation...
Nowadays, Online Social Networks (OSNs) has become one of the most common ways among people to facilitate communication. This has made it a target for attackers to steal information from influential users and has brought new forms of customized attacks for OSNs. Attackers take advantage of the user's trustworthiness when using OSN. This exploitation leads to attacks with a combination of both classical...
various researchers and practitioners have identified a range of problems and deficiencies with existing change-related frameworks, while each framework can include unique valuable elements in its people/process/technology aspects and theoretical foundations. In such a setting, we have adopted a holistic approach through examining an armada of existing frameworks and methodologies. Several decades...
To ensure the scalability of big data analytics, approximate MapReduce platforms emerge to explicitly trade off accuracy for latency. A key step to determine optimal approximation levels is to capture the latency of big data jobs, which is long deemed challenging due to the complex dependency among data inputs and map/reduce tasks. In this paper, we use matrix analytic methods to derive stochastic...
Mobile applications (apps) often transmit sensitive data through network with various intentions. Some transmissions are needed to fulfill the app's functionalities. However, transmissions with malicious receivers may lead to privacy leakage and tend to behave stealthily to evade detection. The problem is twofold: how does one unveil sensitive transmissions in mobile apps, and given a sensitive transmission,...
Collapsed forwarding has long been used in cache systems to reduce the load on servers by aggregating requests for the same content. Named Data Networking (NDN) as a future Internet architecture incorporates this technique through a data structure called Pending Interest Table (PIT). The request aggregation feature suggests that PIT can be viewed as a nonreset time-to-live (TTL) based cache. The Content...
Network slicing to enable resource sharing among multiple tenants-network operators and/or services-is considered a key functionality for next generation mobile networks. This paper provides an analysis of a well-known model for resource sharing, the ‘share-constrained proportional allocation’ mechanism, to realize network slicing. This mechanism enables tenants to reap the performance benefits of...
The objective of this paper is to propose the rule-based algorithmic approach for solving problems of faults influence on the service quality in access networks. In this paper the graph oriented model for network and communication services representation, the rule-based system and corresponding output mechanism, the algorithms for the faults impact analysis based on graph traversal schemes are proposed...
With the flexibility and programmability levels offered by Network Functions Virtualization (NFV), it is expected to catalyze the upcoming “softwarization” of the network through software implementation of networking functionalities on virtual machines (VMs). While looking into the different issues thrown at NFV, numerous works have demonstrated how performance, power consumption and, consequently,...
The Magnetic Induction (MI)-based communication techniques enable the applications of wireless sensor networks (WSNs) in complex environments, such as underground and underwater environments. However, the complex environments usually consist of many conductive objects that can significantly enhance or block the MI signals. Efficient communications can be achieved if we can smartly utilize the positive...
In this paper are offered vector-branching diagrams for modeling the TIF processes. Analyzed properties and disadvantages of TIF methods that make it impossible to use certain methods. To solve these problems invited using of subtractive-additive TIF method. Proved effectiveness of their application, by comparing the TIF methods, and the coefficient of efficiency for different bits capacity.
Today, processing integrated information within and between enterprises is increasingly becoming more and more critical, and so is the implementation and evaluation of an Enterprise Architecture (EA). The review of literature on EA evaluation shows several issues. However, the evaluation of EAs has not attracted sufficient attention, and thus, this research area has not been explored thoroughly yet...
VANETs can benefit by using an infrastructure-less model such as Floating Content (FC) in absence of infrastructures or as support to these latter. This work presents FC performances in vehicular context by using Random Waypoint mobility model.
The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the infrastructure, to the Vehicle-to-vehicle (V2V) network. Floating content (FC) represents a promising paradigm to share ephemeral content without direct support from infrastructure. It is based on constraining...
Because of their familiarity with various sites and members, elderly people behave differently in the dining hall, including when they choose their seats. More than half elderly tend to choose the same seats, and prefer to use personal items to occupy the seats. They also move the chairs or even communicate with others to make sure the people they know sit beside them. However, for some elderly people,...
Growing attention is being paid to the use of game-based learning in education, due to the rapid progress of information technology Internet. Students need to cultivate not only their own abilities, but also the ability of collaboration after graduation. However, collaboration must be directed by appropriate guidance in order to demonstrate the expected results, the rules of the game guide can be...
Location Model is a classification model that capable to deal with mixtures of binary and continuous variables simultaneously. The binary variables create segmentation in the groups called cells whilst the continuous variables measure the differences between groups based on information inside the cells. It is important to note that location model is biased and even impossible to be constructed when...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.