Source Routing allows a node in the path of a packet to specify partially or completely the route taken by that packet. The route is appended to packet header as a list of nodes to traverse, therefore making simple, s...
详细信息
Source Routing allows a node in the path of a packet to specify partially or completely the route taken by that packet. The route is appended to packet header as a list of nodes to traverse, therefore making simple, stateless forwarding decisions. In this paper, we present a novel approach of Source Routing in SDN that uses stacked VLAN tags. Our solution was validated in Mininet using the Ryu controller and proven to have multiple advantages over other forwarding methods.
The problem of estimating spectral density of a nonstationary process satisfying local stationarity conditions is considered. The proposed solution is a two step procedure based on local autoregressive (AR) modeling. ...
详细信息
The problem of estimating spectral density of a nonstationary process satisfying local stationarity conditions is considered. The proposed solution is a two step procedure based on local autoregressive (AR) modeling. In the first step Bayesian-like averaging of AR models, differing in order, is performed. The main contribution of the paper is development of a new final-prediction-error-like statistic, which can be used to select optimal estimation bandwidth in the second step of the procedure. Simulation experiments demonstrate that the combined cooperative-competitive approach outperforms the previously introduced fully competitive scheme.
There are already plenty of Internet of Things (IoT) architectures and systems available worldwide and this creates challenges for software development and systems entities that use these platforms. Global visibility ...
详细信息
ISBN:
(纸本)9781538618400
There are already plenty of Internet of Things (IoT) architectures and systems available worldwide and this creates challenges for software development and systems entities that use these platforms. Global visibility and interoperability through the exposure of these platforms via the web can be achieved through a new paradigm to support an open framework for Web of Things (WoT), which is analogous to web pages. Thus, real-world objects and cloud services could interact via the web. This paper presents the concept of an intelligent lighting system designed in an architectural style based on the Representational State Transfer (REST) web technology and provides intelligent illumination based on Radio-Frequency Identification (RFID) technology.
Machine learning algorithms have recently become very popular for different tasks involving data analysis, classification or prediction. They can provide valuable knowledge for very large sets of data and can reach ve...
详细信息
Machine learning algorithms have recently become very popular for different tasks involving data analysis, classification or prediction. They can provide valuable knowledge for very large sets of data and can reach very good accuracy. However, most algorithms are sensitive to the nature of the data sets, as well as different calibrations which can lead to large differences in performance, accuracy or false positives. In this paper, a classification solution for imbalanced data sets containing information about defects of various trees is presented. The experimental results present a comparison that evaluates the classification performance of the Decision Tree, Random Forest, and Extremely Randomized Trees classifiers. The measures used in the comparison take into account weighted accuracy, precision, and recall for binary and multi-class classification.
In this paper we investigate properties of the Perron exponents of diagonal discrete linear time-varying systems. We give necessary and sufficient conditions for a function / to be the Perron function of the considere...
详细信息
The paper deals with the new methodology of programming of sequential control systems in Lab VIEW language. By similarity to the SFC language and use of only a few defined blocks and connections, the proposed approach...
详细信息
The paper concerns research on the impact of ammonium tungstate additive in metallization baths on chemical properties of thin Ni-Cu-P resistive layers produced by means of chemical metallization. Material properties ...
详细信息
Today, the cyber-space landscape is filled with vulnerabilities and malicious users that exploit them. Adding to this the technological context, with data flooding from all directions, it is evident that maintaining a...
详细信息
ISBN:
(纸本)9781538618400
Today, the cyber-space landscape is filled with vulnerabilities and malicious users that exploit them. Adding to this the technological context, with data flooding from all directions, it is evident that maintaining a good level of security for our systems has become a challenge. The high-dimensional datasets generated by all these diverse technologies needs to be processed efficiently. Inside the pool of data records gathered from all the monitored devices, there is also noise that could negatively influence intrusion detection. Feature selection methods(FSM) may offer a plausible solution to this multi-dimensionality problem, because they reduce the number of features and keep only those significant for solving the stated problem. In this paper we propose to conduct a comparative study of feature selection methods for intrusion detection. We focus on wrapper variants of FSM which are based on swarm intelligence algorithms. To conduct our study, we construct our FSM models based on four SI algorithms (PSO, BA, BAL and BAE) in combination with traditional classifiers (SVM, C4.5 and Naive Bayes) and use the NSL-KDD dataset for our test and comparative analysis.
Decision makers in countries belonging to the Organization for Economic Cooperation and Development (OECD) and even those from non-OECD countries are prioritizing the evaluation of e-portal services. At present, gover...
详细信息
Decision makers in countries belonging to the Organization for Economic Cooperation and Development (OECD) and even those from non-OECD countries are prioritizing the evaluation of e-portal services. At present, governments are implementing programs to demonstrate the advantages of utilizing information and communication technologies in government administration. Using technology could result in internal efficiency and effectiveness of government actions. Evaluating the performance of the information system can reveal weak and strong points, which could be used in improving the system. For many years, scholars have pushed for assessing user satisfaction as a construct for evaluating such systems. Measuring the performance of the e-Government, which is the core of strategies employed by most Arab countries, could lead to the realization and application of the expected benefits of the system. Nonetheless, despite the popular use of e-Government services and applications worldwide, the assessment of electronic services in Iraq has been neglected in practical and theoretical aspects. Moreover, the new portal in Iraq, which is called "citizen e-Government," has decreased the number of citizens conducting business via electronic transactions. The portal design is complex and not user friendly. To respond to this need, this study assesses "Citizen E-Government Portal," which is a new portal in the Communications Directorate in Thi-Qar, according to employee perspective. The study used five constructs, namely, attractiveness, controllability, helpfulness, efficiency, and learnability, in the evaluation. Our findings revealed several weak points in the proposed e-portal, such as slow speed and unavailability of information needed by users. Hence, introductory explanations are needed to improve the proposed portal to increase user rate.
Purpose - The paper aims to present a research on the impact of the stabilization process of a thin metallic layer (Ni-P) produced on a ceramic surface (Al2O3) by means of electroless metallization on its electric par...
详细信息
暂无评论