Acquiring a network of trust relations among users in social media sites, e.g., item-review sites, is important for analyzing users' behavior and efficiently finding reliable information on the Web. We address the...
详细信息
Acquiring a network of trust relations among users in social media sites, e.g., item-review sites, is important for analyzing users' behavior and efficiently finding reliable information on the Web. We address the problem of predicting trustlinks among users for an item-review site. Non-negative matrix factorization (NMF) methods have recently been shown useful for trust-link prediction in such a site where both link and activity information is available. Here, a user activity in an item-review site means posting a review and giving a rating for an item. In this paper, for better trust-link prediction, we propose a new NMF method that incorporates people's evaluation of users' activities as well as trust-links and users' activities themselves. We further apply it to an analysis of users' behavior. Using two real world item-review sites, we experimentally demonstrate the effectiveness of the proposed method.
In the current scenario Cognitive Radio (CR) is the best available solution to overcome spectrum shortage problem. Cognitive Radio Ad Hoc Networks (CRAHNs) is the use of CR technology in the wireless ad-hoc network sc...
详细信息
In the current scenario Cognitive Radio (CR) is the best available solution to overcome spectrum shortage problem. Cognitive Radio Ad Hoc Networks (CRAHNs) is the use of CR technology in the wireless ad-hoc network scenario. The field of CRAHNs is still in this nascent stage therefore not much work has been done related to security issues associated with these types of networks. In order to provide secure data transmission over these networks it is mandatory to make these networks robust and less vulnerable against the various types of attacks. Through this report we have presented an implementation and simulation study of Network Layer Attacks primarily Black Hole Attack and Gray Hole Attack in detail with their impacts on the various network parameters. The Black Hole Attack is a type of Denial of Service(DoS) attack where the node that has turned malicious advertises itself as the most optimal path to reach the destination, thus drawing all the traffic towards itself and later either it drops all the received packets or prevent them from reaching their destinations. The Gray Hole Attack is a variation of black hole attack in which selective forwarding principles are used to selectively drop some data and to forward the rest. In this Project using NS2 with the CRAHN extension as the simulator, effect of these attacks on the various network parameters of CRAHNs have been recorded and compared to present an oversight of how performance is affected whenever the network gets injected with these attacks.
When implementing Artificial Neural Networks with imperative programing languages, the resulting programs are usually highly coupled. This problem usually hampers distribution over multiple processors, especially when...
详细信息
When implementing Artificial Neural Networks with imperative programing languages, the resulting programs are usually highly coupled. This problem usually hampers distribution over multiple processors, especially when the ANN executes on general-purpose processors. An emerging technique called Notification Oriented Paradigm (NOP) facilitates the development of distributed and decoupled systems, and minimizes the amount of processing calculations, while avoiding structural and temporal redundancies in the logical-causal evaluation. These advantages seem to be relevant to parallel systems, especially in the case of ANNs. In this sense, this paper presents the development of a Multi-Layer Perceptron using Backpropagation training algorithm, based on the concepts of NOP in its implementation. The overall performance of NOP implementation was not so good in comparison with the Imperative Paradigm (IP) implementation, because the current materialization of NOP (framework) is still based on a single thread implementation. Even though, this implementation proved to be plausible and decoupled, as well as parallelizable according the inherent parallelism of ANNs, conceptually intrinsic on the NOP.
Considering the resource limitations of mobile terminals, such as memory capacity and battery power, it will take a large portion of resources if the complex malicious detection system is implemented in mobile termina...
详细信息
In the medical environment, clinical research has been predomi-nantly paper-based. The Case Report Form (CRF) is an example of paper-based tools used in documenting clinical trials. A clinical trial can be understood ...
详细信息
The Internet,once a network of networks,has become not only the platform of choice for delivering services to increasingly mobile users,but also the connective tissue between people,information and *** all new and pop...
详细信息
The Internet,once a network of networks,has become not only the platform of choice for delivering services to increasingly mobile users,but also the connective tissue between people,information and *** all new and popular computing and application paradigms were born in the Internet,or at least motivated by it,including Web 2.0,Social Networking,Mobile Internet,Cloud computing,Internet of things,and big *** has played a central part in the evolution of the *** open,dynamic,evolving environment of Internet computing continues to demand new sotware technologies in order to
Requirements process improvement (RPI) in software systems is aimed at systematically controlling changes of the requirements specification and making improvements that result in high quality specifications at reduced...
详细信息
In wireless network, backbone network plays an important role on forwarding data. Further, in order to reduce the delay and save energy, the minimum connected dominating set (MCDS) is an effective way to construct a b...
详细信息
In wireless network, backbone network plays an important role on forwarding data. Further, in order to reduce the delay and save energy, the minimum connected dominating set (MCDS) is an effective way to construct a backbone. However, it is NP-hard to construct the MCDS. In this paper, we propose an efficient centralized algorithm, redundancy connected dominating set (RCDS), to construct a relatively optimal connected dominating set with the economic computation cost of O (Δ 2 n) Specifically, the local strategy is employed to obtain the maximal independent set (MIS) firstly, and then a virtual backbone network is generated by adding the local joint intermediate nodes in the general graph.
Jetstream will be the first production cloud resource supporting general science and engineering research within the XD ecosystem. In this report we describe the motivation for proposing Jetstream, the configuration o...
详细信息
Connected dominating set (CDS) is a representative technique for constructing virtual backbones of wireless networks to improve the efficiency of communication. Most of existing works on CDS aim to construct the minim...
详细信息
Connected dominating set (CDS) is a representative technique for constructing virtual backbones of wireless networks to improve the efficiency of communication. Most of existing works on CDS aim to construct the minimum CDS (MCDS). However, MCDS may not be sufficient in cognitive radio networks where communication links are prone to failure due to random activities of primary users. To solve the problem, an algorithm is proposed in this paper to construct a CDS with redundancy and the maximum spectrums in CRNs. Moreover, with an integer programming formulation, an algorithm is designed to obtain the minimum 2-conneted 2-dominating set with maximum spectrums (MSs) in CRNs. To the best of our knowledge, this is the first integer programming formulation for the problem and the concept of MSs is put forward first. Simulation results indicate that our algorithm performs well.
暂无评论