Search results for "Computer network"
showing 10 items of 1634 documents
Using the Breeder genetic algorithm to optimize a multiple regression analysis model used in prediction of the mesiodistal width of unerupted teeth
2014
For the prediction of the unerupted canine and premolars mesiodistal size, have been proposed different variants of multiple linear regression equations (MLRE). These are based on the amount of the upper and lower permanent incisors with a tooth of the lateral support. Aim of present study was to develop a method for optimization of MLRE, using a genetic algorithm for determining a set of coefficients that minimizes the prediction error for the sum of permanent premolars and canines dimensions from a group of young people in an area Romania's central city represented by Sibiu. To test the proposed method, we used a multiple linear regression equation derived from the estimation method propo…
Bot recognition in a Web store: An approach based on unsupervised learning
2020
Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…
Availability in BitTorrent Systems
2007
In this paper, we investigate the problem of highly available, massive-scale file distribution in the Internet. To this end, we conduct a large-scale measurement study of BitTorrent, a popular class of systems that use swarms of actively downloading peers to assist each other in file distribution. The first generation of BitTorrent systems used a central tracker to enable coordination among peers, resulting in low availability due to the tracker's single point of failure. Our study analyzes the prevalence and impact of two recent trends to improve BitTorrent availability: (i) use of multiple trackers, and (ii) use of Distributed Hash Tables (DHTs), both of which also help to balance load be…
Increasing the attractiveness of a cruise port for cargo business: The contribution of stakeholders
2021
Abstract Cruise and cargo operations, though distinct seaport activities, have sufficiently similar functions that by accommodating cargo business in a largely cruise domain, a port may achieve increased attractiveness and better resource utilization. We sought to conceptualize a framework by which an existing cruise port can integrate divergent stakeholder interests to achieve port attractiveness under this duality. We adopted a qualitative approach involving in-depth interviews with experts representing the port authority and key stakeholders at Port Canaveral, the second busiest multi-day cruise embarkation port in the world. We identified a supply chain integration model as a pathway to…
A new project management approach for R&D software projects in the automotive industry - continuous V-model
2017
Most current work activities in R&D centres are innovative and dynamic, with project management acting as the discipline that governs them. The improvement of PM methods has become a necessity due to the following main factors: classical methodologies are increasingly difficult to apply, cutbacks in project duration are requested by organisations and customers, demands for product quality are continuously expanding. The paper examines how PM concepts are used in developed R&D projects, based on the V-model approach. It also introduces an enhanced new approach called Continuous V-model - CVM, based on agile concepts. The model has been applied on a real automotive R&D project and the resulte…
Collaborative Content Downloading in VANETs with Fuzzy Comprehensive Evaluation
2019
Vehicle collaborative content downloading has become a hotspot in current vehicular ad-hoc network (VANET) research. However, in reality, the highly dynamic nature of VANET makes users lose resources easily, and the transmission of invalid segment data also wastes valuable bandwidth and storage of the users&rsquo
A survey on peer-to-peer SIP based communication systems
2010
Published version of an article from the journal: Peer-to-Peer Networking and Applications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s12083-009-0064-4 Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in …
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
2010
Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
A linear matrix inequality approach to robust fault detection filter design of linear systems with mixed time-varying delays and nonlinear perturbati…
2010
Accepted version of an article in the journal: Journal of the Franklin Institute-Engineering and Applied Mathematics. The definitive version can be found on Sciverse: http://dx.doi.org/10.1016/j.jfranklin.2010.03.004 In this paper, the problem of robust fault detection filter (RFDF) design for a class of linear systems with some nonlinear perturbations and mixed neutral and discrete time-varying delays is investigated. By using a descriptor technique, Lyapunov-Krasovskii functional and a suitable change of variables, new required sufficient conditions are established in terms of delay-dependent linear matrix inequalities (LMIs) to synthesize the residual generation scheme. Based on the Luen…