With the fact of rapid development of the World Wide Web, the web usage has imposed a heavy load on the network and server infrastructure, and significant delays are not uncommon. To mitigate the effects of these incr...
详细信息
ISBN:
(纸本)9781424465392
With the fact of rapid development of the World Wide Web, the web usage has imposed a heavy load on the network and server infrastructure, and significant delays are not uncommon. To mitigate the effects of these increased usages, there has been much research and work in web caching. Web caching reduces network load, server load, and the latency of responses. However, one main disadvantage of web caching is that a stale page might be returned to clients if the origin version has changed and there is no consistency mechanism to maintain. In this paper, we present a survey of contemporary cache consistency mechanisms in use on the Web today and examine recent research in web cache consistency. In addition, we analyze the performance of each algorithm of caching consistency using communication traffic model in details.
We will explore a new network transport ”optical flow switching-OFS”, that will enable significant data rate growth and cost-effective scalability of next-generation networks. The talk will concentrate on the tough ...
详细信息
We will explore a new network transport ”optical flow switching-OFS”, that will enable significant data rate growth and cost-effective scalability of next-generation networks. The talk will concentrate on the tough network management/control issues of OFS.
A series of support vector machine (SVM) forecast experiments are carried out to reveal the relation between the SVM training sample size and SVM correct forecast ratio for simulation experiment results. Experiment re...
详细信息
The frequent items problem is to process a stream as a stream of items and find all items occurring more than a given fraction of the time. It is one of the most heavily studied problems in data stream mining, dating ...
详细信息
The frequent items problem is to process a stream as a stream of items and find all items occurring more than a given fraction of the time. It is one of the most heavily studied problems in data stream mining, dating back to the 1980s. Aiming at higher false positive rate of the Space-Saving algorithm, an LRU-based (Least Recently Used, LRU) improved algorithm with low frequency item pre-eliminated is proposed. Accuracy, stability and adaptability of the improved algorithm have been apparently enhanced. Experimental results indicate that the algorithm can not only be used to find the frequent items, and can be used to estimate the frequency of them precisely. The improved algorithm can be used for online processing both high-speed network packet stream and backbone NetFlow stream.
This paper calculates the optical power budget and power margin for designing a conventional passive optical network (PON)-based Fiber-To-the-Home (FTTH) and Intelligent Fiber-To-the-Home (i-FTTH) with different link ...
详细信息
This paper calculates the optical power budget and power margin for designing a conventional passive optical network (PON)-based Fiber-To-the-Home (FTTH) and Intelligent Fiber-To-the-Home (i-FTTH) with different link length of drop fiber and optical power splitting ratio of 1×N passive optical splitter. A simple calculation is used to determine how much loss and power are available for each individual fiber link in both networks with different type of signals. The cost estimation for both networks including the additional optical monitoring, switching, and protection systems are calculated and compared.
Recently, the number of spam mails is exponentially growing. It affects the costs of organizations and annoying the e-mail recipient. Spammers always try to find the way to avoid filtering out from the email system. A...
详细信息
ISBN:
(纸本)9781424469864;9788988678206
Recently, the number of spam mails is exponentially growing. It affects the costs of organizations and annoying the e-mail recipient. Spammers always try to find the way to avoid filtering out from the email system. At the same time, as an email recipient or network system/administrator, we try to have an effective spam mail filtering technique to catch the spam mails. The problems of spam mail filtering are that each user has different perspective toward spam mails; so there are many types of spam mails, while the challenge is how to detect the various types and forms of spam mails. In this paper, behaviors of spammers are used to customize the filtering rule. The information from the spam messages also can be used to filter spam mails and it can give higher accuracy than the keyword-based method does. We propose a spam classification approach using Random Forest algorithm. Spam Assassin Corpus is selected as a database for classification. It consists of 6,047 email messages, where 4,150 of them are the legitimate messages and the other 1,897 messages are the spam mails.
In the application of target tracking based on dynamic convey tree-based collaboration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper,...
详细信息
ISBN:
(纸本)9781424497799
In the application of target tracking based on dynamic convey tree-based collaboration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper, we refine slot allocation to the nodes in dynamic convey tree and design an energy efficient MAC protocol called D-TDMA, which avoids collisions and interferences and allocates contiguous active slots to nodes as far as possible during data aggregation from leaf nodes to a root node. As a result, the energy consumption in switching from sleeping to active state is saved. Simulation results show that D-TDMA not only gets rid of the impact of collisions and interferences among nodes in dynamic convey tree, but also performs similar throughput to that of CSMA-like mechanism where nodes work without active/sleep scheduling strategy. Our protocol outperforms ESR in both energy efficiency and low delay.
To detect internet worm, many academic approaches have been proposed. In this paper, we provide a new approach to detect internet worm. We consider behaviors of internet worm that is different from the normal pattern ...
详细信息
ISBN:
(纸本)9781424469864;9788988678206
To detect internet worm, many academic approaches have been proposed. In this paper, we provide a new approach to detect internet worm. We consider behaviors of internet worm that is different from the normal pattern of internet activities. We consider all network packets before they reach to the end-user by extracting a certain number of features of internet worm from these packets. Our network features mainly consist of characteristics of IP address, port, protocol and some flags of packet header. These features are used to detect and classify behavior of internet worm by using 3 different data mining algorithms which are Bayesian network, Decision Tree and Random Forest. In addition, our approach not only can classify internet worm apart from the normal data, but also can classify network attacks that have similar behaviors to the internet worm behaviors. Our approach provides good results with detection rate over 99.6 percent and false alarm rate is close to zero with Random forest algorithm. In addition, our model can classify behaviors of DoS and Port Scan attacks with detection rate higher than 98 percent and false alarm rate equal to zero.
In this paper, the embedded systems and ZigBee technology are used to build a miner's lamp monitoring and control system. This miner's lamp monitoring and control system is composed of a central control statio...
详细信息
ISBN:
(纸本)9781424490875
In this paper, the embedded systems and ZigBee technology are used to build a miner's lamp monitoring and control system. This miner's lamp monitoring and control system is composed of a central control station and a number of miner's lamp charging nodes. The central control station of miner's lamp monitoring and control system is constructed with the embedded microcontrollers S3C2410A based on ARM9, the chip CC2430 having ZigBee wireless communication technology and the corresponding interface circuit; The chip CC2430 including 8051, sampling circuit and the corresponding sensors are used to construct miner's lamp node. Zigbee is used to communicate wireless between central control station and miner's lamp node. This system achieves monitoring and control of the state of charge on the miner's lamp, and the high effective control and management on use of miner's lamp. Its functionality, the hardware circuit design, bottom drivers design, operating system transplant, and user program design are analyzed in this paper; this system effectively improved the reliability of miner's lamp charging system and the intelligence level of miner's lamp management.
In this paper, a novel design method for two band antenna using monopole antenna with Sperrtopf for mobile communication and Digital communications System is presented. We made a trial two-band antenna, with operating...
详细信息
ISBN:
(纸本)9781934142141
In this paper, a novel design method for two band antenna using monopole antenna with Sperrtopf for mobile communication and Digital communications System is presented. We made a trial two-band antenna, with operating frequencies of 800MHz and 2.04 GHz, and examined the design method by the comparing measured VSWR of the antenna with the simulation results using simulation soft WIPL-D Microwave and Nec-2. The simulation results of the VSWR were in good agreement with the experimental results.
暂无评论