Search results for "Computer network"

showing 10 items of 1634 documents

Using the Breeder genetic algorithm to optimize a multiple regression analysis model used in prediction of the mesiodistal width of unerupted teeth

2014

For the prediction of the unerupted canine and premolars mesiodistal size, have been proposed different variants of multiple linear regression equations (MLRE). These are based on the amount of the upper and lower permanent incisors with a tooth of the lateral support. Aim of present study was to develop a method for optimization of MLRE, using a genetic algorithm for determining a set of coefficients that minimizes the prediction error for the sum of permanent premolars and canines dimensions from a group of young people in an area Romania's central city represented by Sibiu. To test the proposed method, we used a multiple linear regression equation derived from the estimation method propo…

Unerupted TeethComputer Networks and CommunicationsRegression analysisComputer Science ApplicationsSet (abstract data type)stomatognathic systemComputational Theory and MathematicsBreeder genetic algorithmGenetic algorithmStatisticsLinear regressionCalipersPermanent teethMathematicsINTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL
researchProduct

Bot recognition in a Web store: An approach based on unsupervised learning

2020

Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…

Unsupervised classificationWeb bot detectionComputer Networks and CommunicationsComputer scienceInternet robot02 engineering and technologyMachine learningcomputer.software_genreWeb trafficWeb serverMachine learning0202 electrical engineering electronic engineering information engineeringArtificial neural networkbusiness.industrySupervised learning020206 networking & telecommunicationsPerceptronWeb application securityWeb botComputer Science ApplicationsSupport vector machineGenerative modelComputingMethodologies_PATTERNRECOGNITIONHardware and ArchitectureSupervised classificationUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer
researchProduct

Availability in BitTorrent Systems

2007

In this paper, we investigate the problem of highly available, massive-scale file distribution in the Internet. To this end, we conduct a large-scale measurement study of BitTorrent, a popular class of systems that use swarms of actively downloading peers to assist each other in file distribution. The first generation of BitTorrent systems used a central tracker to enable coordination among peers, resulting in low availability due to the tracker's single point of failure. Our study analyzes the prevalence and impact of two recent trends to improve BitTorrent availability: (i) use of multiple trackers, and (ii) use of Distributed Hash Tables (DHTs), both of which also help to balance load be…

UploadBitTorrent trackerbusiness.industryComputer scienceDistributed computingThe Internetcomputer.file_formatLoad balancing (computing)businessBitTorrentcomputerHash tableComputer network
researchProduct

Increasing the attractiveness of a cruise port for cargo business: The contribution of stakeholders

2021

Abstract Cruise and cargo operations, though distinct seaport activities, have sufficiently similar functions that by accommodating cargo business in a largely cruise domain, a port may achieve increased attractiveness and better resource utilization. We sought to conceptualize a framework by which an existing cruise port can integrate divergent stakeholder interests to achieve port attractiveness under this duality. We adopted a qualitative approach involving in-depth interviews with experts representing the port authority and key stakeholders at Port Canaveral, the second busiest multi-day cruise embarkation port in the world. We identified a supply chain integration model as a pathway to…

Urban StudiesAttractivenessSupply chain managementSupply chainGeography Planning and DevelopmentCruiseStakeholderTransportationContext (language use)BusinessBusiness modelPort (computer networking)Industrial organizationCase Studies on Transport Policy
researchProduct

A new project management approach for R&D software projects in the automotive industry - continuous V-model

2017

Most current work activities in R&D centres are innovative and dynamic, with project management acting as the discipline that governs them. The improvement of PM methods has become a necessity due to the following main factors: classical methodologies are increasingly difficult to apply, cutbacks in project duration are requested by organisations and customers, demands for product quality are continuously expanding. The paper examines how PM concepts are used in developed R&D projects, based on the V-model approach. It also introduces an enhanced new approach called Continuous V-model - CVM, based on agile concepts. The model has been applied on a real automotive R&D project and the resulte…

V-ModelComputer Networks and Communicationsbusiness.industryComputer science05 social sciences0211 other engineering and technologies02 engineering and technologyManufacturing engineeringProject planningHardware and Architecture021105 building & construction0502 economics and businessPerformance indicatorProject managementProject portfolio managementbusinessSoftware engineering050203 business & managementSoftware project managementInformation SystemsAgile software developmentProject management triangleInternational Journal of Web Engineering and Technology
researchProduct

Collaborative Content Downloading in VANETs with Fuzzy Comprehensive Evaluation

2019

Vehicle collaborative content downloading has become a hotspot in current vehicular ad-hoc network (VANET) research. However, in reality, the highly dynamic nature of VANET makes users lose resources easily, and the transmission of invalid segment data also wastes valuable bandwidth and storage of the users&rsquo

VANETPhysics and Astronomy (miscellaneous)Linear programmingComputer scienceGeneral Mathematics02 engineering and technologyFuzzy logicUploadlangaton tiedonsiirtooptimointi0502 economics and businessfuzzy comprehensive evaluation0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)vehicle collaborative content downloadingta113050210 logistics & transportationVehicular ad hoc networkbusiness.industryQuality of servicelcsh:Mathematics05 social sciencesBandwidth (signal processing)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsSpectral efficiencylcsh:QA1-939Chemistry (miscellaneous)The InternetbusinessComputer networkSymmetry
researchProduct

A survey on peer-to-peer SIP based communication systems

2010

Published version of an article from the journal: Peer-to-Peer Networking and Applications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s12083-009-0064-4 Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in …

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Computer Networks and Communicationsbusiness.industryComputer scienceMessage routingPeer-to-peerCommunications systemcomputer.software_genrePeer reviewWorld Wide WebNAT traversalRobustness (computer science)ServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552businessChord (peer-to-peer)computerSoftwareComputer networkPeer-to-Peer Networking and Applications
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

A linear matrix inequality approach to robust fault detection filter design of linear systems with mixed time-varying delays and nonlinear perturbati…

2010

Accepted version of an article in the journal: Journal of the Franklin Institute-Engineering and Applied Mathematics. The definitive version can be found on Sciverse: http://dx.doi.org/10.1016/j.jfranklin.2010.03.004 In this paper, the problem of robust fault detection filter (RFDF) design for a class of linear systems with some nonlinear perturbations and mixed neutral and discrete time-varying delays is investigated. By using a descriptor technique, Lyapunov-Krasovskii functional and a suitable change of variables, new required sufficient conditions are established in terms of delay-dependent linear matrix inequalities (LMIs) to synthesize the residual generation scheme. Based on the Luen…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Automatic controlComputer Networks and CommunicationsApplied MathematicsVDP::Technology: 500::Mechanical engineering: 570Linear systemLinear matrix inequalityRobust controlControl de robustesaNonlinear controlFault detection and isolationControl automàticFilter designDiscrete time and continuous timeControl and Systems EngineeringControl theorySignal ProcessingSistemes Teoria deRobust controlSystem theoryLinear filterMathematics
researchProduct