To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-...
详细信息
To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-based approach rather than server or client logs. Packet traces surpass others in the amount of information contained. Quantitative analyses show that different categories of web pages have different complexity characteristics. Experimental results show that a news web page usually loads much more elements at more accessing levels from much more web servers within diverse administrative domains over much more concurrent transmission control protocol (TCP) flows. About more than half of education pages each only involve a few logical servers, where most of elements of a web page are fetched only from one or two logical servers. The number of content types for web game traffic after login is usually least. The system can help web page designers to design more efficient web pages, and help researchers or Internet users to know communication details.
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additiv...
详细信息
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additive white Gaussian noise (AWGN) channels. A fixed redundancy (FR) coding scheme is considered, which encodes each k-bits update as an n-bits packet by a low-density parity-check (LDPC) code. By using the renewal-reward theory, a closed-form expression of the average AoI under the FR scheme is derived. Simulation results show that the average AoI relies on E_b/N_0, especially in the low E_b/N_0 region. For different E_b/N_0, an optimal code length always exists to minimize the average AoI. In addition, the same average AoI can be achieved with different code lengths in the high E_b/N_0 region. Hence, in the high E_b/N_0 region, short codes are preferred especially when the transmission delay is taken into account.
In this paper, the content popularity prediction problem in cache-enabled fog radio access networks (F-RANs) is investigated. In order to make the popularity prediction accurate and adaptive, we propose to learn the c...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
In this paper, the content popularity prediction problem in cache-enabled fog radio access networks (F-RANs) is investigated. In order to make the popularity prediction accurate and adaptive, we propose to learn the corresponding popularity prediction model for every content class from the preprocessed popularity series by training a simplified bidirectional long short-term memory (Bi-LSTM) network, and further use it to help build a content classifier in terms of content popularity trend in the training phase. Then, content popularity can be predicted by the right prediction model with respect to the corresponding content class in the predicting phase. Considering that it is hard to collect enough data about numerous content features through F-APs, we propose to only use the number of requests. Our proposed content popularity prediction policy offers a high prediction accuracy with low computational complexity by transferring the high complexity tasks from the predicting phase to the training phase. Simulation results show that the cache hit rate of our proposed policy approaches the optimal performance.
Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for c...
详细信息
Android OS maintains its dominance in smart terminal markets, which brings growing threats of malicious applications (apps). The research on Android malware detection has attracted attention from both academia and ind...
详细信息
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature judgment, which require the high accuracy of Chinese character segmentation. However, there are many problems in the real handwriting, such as continuous writing, uneven strength of writing, personalized writing style and so on, which lead to the difficulty of segmentation in the ordinary handwriting. To solve the above problems, we propose an effective method based on image texture where the uniformity of writing lines and writing style is taken as an effective criterion. In our method, Gabor transform is used to extract the image features of writing samples, and finally the statistical learning method of support vector machine is used to effectively evaluate the writing quality. Experiments on multiple real datasets including CHAED show that our method is effective and accurate. The advantage of this method is that it does not need to segment fonts, and the cost of global feature extraction is small.
Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectiv...
详细信息
Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectively. In this paper, we mounted meet-in-the-middle attacks on 14-round Piccolo-80 without preand post-whitening keys and 18-round Piccolo-128 with post-whitening keys by exploiting the properties of the key schedule and Maximum Distance Separable(MDS) matrix. For Piccolo-80, we first constructed a 5-round distinguisher. Then 4 rounds and 5 rounds were appended at the beginning and at the end,respectively. Based on this structure, we mounted an attack on 14-round Piccolo-80 from the 5 th round to the 18 th round. The data, time, and memory complexities were 252chosen plaintexts, 267.44encryptions, and 264.91blocks, respectively. For Piccolo-128, we built a 7-round distinguisher to attack 18-round Piccolo-128 from the 4 th round to the 21st round. The data, time, and memory complexities were 252chosen plaintexts,2126.63encryptions, and 2125.29blocks, respectively. If not considering results on biclique cryptanalysis,these are currently the best public results on this reduced version of the Piccolo block cipher.
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, put...
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, puts forward the system architecture of power micro-meteorological monitoring and early warning system, which provides a reference for the establishment of power micro-meteorological monitoring and early warning system.
A great number of mobile applications (apps) have been released to the market. Therefore, software maintenance for these apps become an important and challenging task. For each app, developers usually submit issue rep...
详细信息
Notes on two constructions of zero-difference balanced (ZDB) functions are made in this letter. Then ZDB functions over Ze × Îik=0 Fqi are obtained. And it shows that all the known ZDB functions using cyclot...
详细信息
暂无评论