Filters








11 Hits in 4.9 sec

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
and classification, congestion control, resource and fault management, QoS and QoE management, and network security.  ...  Undoubtedly, ML has been applied to various mundane and complex problems arising in network operation and management.  ...  Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper.  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications

Yudong Zhang, Shuihua Wang, Genlin Ji
2015 Mathematical Problems in Engineering  
Particle swarm optimization (PSO) is a heuristic global optimization method, proposed originally by Kennedy and Eberhart in 1995. It is now one of the most commonly used optimization techniques.  ...  , mechanical engineering, fuel and energy, medicine, chemistry, and biology.  ...  [186] proposed a novel spam detection method that focused on reducing the false positive error of mislabeling nonspam as spam.  ... 
doi:10.1155/2015/931256 fatcat:ubc5eywnhzdjllxjaywe4czhnm

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  We are using normally Hadoop distributed file system for virtualization at the various storage levels and applying security interfaces for Hadoop which includes an XACML implementation and specifications  ...  The client establishes trust in emotional and cognitive (evidence-based) grounds.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
2022 figshare.com  
For devices that use multicast communication, such as those using UPnP and CoAP, anybody can listen in and see who sends the messages.  ...  It is also used spam filtering to identify the spam emails and sentiment analysis in social media analysis to identify positive and negative customer sentiments.  ...  At time t, the velocity and position of the ith bat are updated by using the following equations: Where and are the minimum and maximum frequency of the sound waves emitted by bats, respectively β is a  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu

Coimbatore-6410 4243

Tadeusz Hryniewicz, Tomasz Borowski, B Ramani, Anand Paul, Mr Kumar, Mr Ravichandran Advisor, T Devi, Latha Parameswaran, Chairperson, Ms Sampath, Ms Shaju, Mr Prashanth
unpublished
Spamming The transmission latency will be increased, due to the presence of spamming message.  ...  At a lower layer of Hadoop, the same structure of MapReduce and HDFS is used.  ...  Thus this paper explains about the security requirements with related attacks happened in the cryptographic based classification moreover their corresponding security mechanisms and protocols used.  ... 
fatcat:bq2eelzqujhjzfn6qevs75mdim

The International Symposium on Advances in Content-oriented Networks and Systems CONNET 2015 Technical Program Committee

Tao Zheng, Carlos Westphall, Pedro Andrés, Aranda Gutiérrez, Telefónica I+d -Madrid, Spain Carlos, Becker Westphall, Simone Silvestri, Yoshiaki Taniguchi, Abdulrahman Yarali, Emmanuel Bertin, Steffen Fries (+201 others)
unpublished
The audience will hear the latest technological updates and will be provided with examples of successful IPv6 deployments; it will be offered an opportunity to learn what to expect from IPv6 and how to  ...  The conference covered fundamentals on networking and services, and highlights new challenging industrial and research topics.  ...  mail, use SPF [6] and DKIM [7] for mail authentication and spam filters.  ... 
fatcat:jwpmtq52cvajxesuwhilcta6ny

Middleware Solutions for Effective Cloud-CPS Integration in Pervasive Environment

Alessandro Zanni
2019
meetings together, and to Ulf and Stefan, from STC, for the support during my staying in Sweden.  ...  Among all the nice and talented people I met during the experiences abroad, in particular, thanks to Se-young, from LIP6-Phare, for the kindness and the knowledge shown during the valuable work and long  ...  This is especially true for mobile applications aimed to seamlessly augmenting users cognitive abilities such as speech recognition, natural language processing, computer vision, and augmented reality  ... 
doi:10.48676/unibo/amsdottorato/8527 fatcat:tfkg7lo4rfepznap2klfypqffm

Dagstuhl Reports, Volume 3, Issue 09, September 2013, Complete Issue [article]

2014
Our initial suggests how we might use these to explore the landscape of systems and algorithms that might be possible in the future.  ...  We provide an extensive study of the properties of the proposed aggregate operators and the new data structures.  ...  Units of human work can be used to address the problems studied in the fields of pattern recognition and artificial intelligence.  ... 
doi:10.4230/dagrep.3.9 fatcat:oilweqoffjbx7bjnxvg6vorrzu

A METHOD FOR EVALUATION OF INFORMATIONAL SERVICES-STEP 2: COMPUTING THE INFORMATIONAL SERVICES' PERFORMANCE PROPORTIONALITY CONSTANTS

Krassimira Ivanova, Ivan Ivanov, Mariyana Dimitrova, Krassimir Markov, Stefan Karastanev
2016 Online) International Journal "Information Models and Analyses   unpublished
To discover the value of growth one has to test both source and enhanced systems running equal or similar services.  ...  Acknowledgements This work is funded and supported by the Telecommunications Research Centre (TRC), University of Limerick, Ireland and by the NI15-FMI-004 project of the Scientific Fund of the Plovdiv  ...  Máirtín O'Droma, for the fruitful discussions and inspiring thoughts on the subject through many years.  ... 
fatcat:t65qocip2faghjjoh6sie2vdm4

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
2020
Both seminars share the same contents and differ only in their duration.  ...  For this semester the arwards where given to Bernhard Vorhofer with the paper Extending ZMap: Round-Trip Time Measurement via ICMP and TCP and Simon Bachmeier with the paper Network Simulation with OMNet  ...  The other type is the Groupwise Transient Key (GTK), a single key that is used for multicasts and broadcast, and therefore is known by the AP and all clients in the network.  ... 
doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4

Annual Report 2014
国立情報学研究所 平成26年度(2014年度)年報

We updated the ontology-orientedfolksonomy reference model according the two use cases.  ...  「Collective intelligence-based social media management」 研究代表者:ANDRES, Frederic We updated the scenarios for the ITmaster use case under the cooperation with CTI (Campinas, Brazil).  ... 
doi:10.20736/0000001206 fatcat:4fzoyhkbnjfylmehgsw7oovtwy