32 research outputs found

    An Energy-aware Routing Mechanism for Latency-sensitive Traffics

    Get PDF
    With the rapid development of Internet technology and enhanced QoS requirements, network energy consumption has attracted more and more attentions due to the overprovision of network resources. Generally, energy saving can be achieved by sacrificed some performance. However, many popular applications require real-time or soft real-time QoS performance for attracting potential users, and existing technologies can hardly obtain satisfying tradeoffs between energy consumption and performance. In this paper, a novel energy-aware routing mechanism is presented with aiming at reducing the network energy consumption and maintaining satisfying QoS performance for these latency-sensitive applications. The proposed routing mechanism applies stochastic service model to calculate the latency-guarantee for any given network links. Based on such a quantitative latencyguarantee, we further propose a technique to decide whether a link should be powered down and how long it should be kept in power saving mode. Extensive experiments are conducted to evaluate the effectiveness of the proposed mechanism, and the results indicate that it can provide better QoS performance for those latency-sensitive traffics with improved energyefficiency

    Identification of Opinion Spammers using Reviewer Reputation and Clustering Analysis

    Get PDF
    Online reviews have increasingly become a very important resource before making a purchasing decisions. Unfortunately, malicious sellers try to game the system by hiring a person or team (which is called spammers) to fabricate fake reviews to improve their reputation.Existing methods mainly take the problem as a general binary classification or focus on some heuristic rules. However, supervised learning methods relies heavily on a large number of labeled examples of deceptive and truthful opinions by domain experts, and most of features mentioned in the heuristic strategy ignore the characteristic of the group organization among spammers. In this paper, an effective method of identifying opinion spammers is proposed. Firstly, suspected spammers are detected by means of unsupervised learning based on reviewer’s reputation. We believe that the reviewer’s reputation has a direct relation with the quality of reviews. Generally, review written by user with lower reputation, shows lower quality and higher possibility to be fake. Therefore, the model assigns reputation score to each reviewer wherein the content based factors and activeness of reviewers are employed efficiently. On basis of all suspected spammers, k-center clustering algorithm is performed to further spot the spammers based on the observation of burst of review release time. Experimental results on Amazon’s dataset are encouraging and indicate that our approach poses high accuracy and recall, and good performance is achieved

    Topological optimization of an offshore-wind-farm power collection system based on a hybrid optimization methodology

    Get PDF
    This paper proposes a hybrid optimization method to optimize the topological structure of an offshore-wind-farm power collection system, in which the cable connection, cable selection and substation location are optimally designed. Firstly, the optimization model was formulated, which integrates cable investment, energy loss and line construction. Then, the Prim algorithm was used to initialize the population. A novel hybrid optimization, named PSAO, based on the merits of the particle swarm optimization (PSO) and aquila optimization (AO) algorithms, was presented for topological structure optimization, in which the searching characteristics between PSO and AO are exploited to intensify the searching capability. Lastly, the proposed PSAO method was validated with a real case. The results showed that compared with GA, AO and PSO algorithms, the PSAO algorithm reduced the total cost by 4.8%, 3.3% and 2.6%, respectively, while achieving better optimization efficiency.Web of Science112art. no. 27

    A New Systemic Safety Detecting Software

    No full text
    Because it is hard to find and to clear cockhorse and virus developed by root kit technology, antivirus soft at present is hard to clear virus in the system, which make the system in dangers status of hazard. So, designing a speedy clear Trojan and virus makes by root kit is very important. The article.is based on SDK, adopting the technology.of kernel to design the Clairvoyant systemic safety detecting software. It major function is monitors.the service of the system and the operation. Monitor the register changer. Search the file, process, system module hided by the virus. It can also end protected processes and delete protected files forcibly. Through the port.mapping of processes, it can find.port messages opened.by system, processes opening ports and.cockhorse effectively. http://dx.doi.org/10.11591/telkomnika.v12i10.5345

    An Adaptive Redundant Reservation Strategy in Distributed Highperformance Computing Environments

    No full text
    In distributed high-performance computing environments, resource reservation mechanism is an effective approach to provide desirable quality of service for large-scale applications. However, conventional reservation service might result in lower resource utilization and higher rejection rate if it is excessively applied. Furthermore, redundant reservation policy has been widely applied in many practical systems with aiming to improve the reliability of application execution at runtime. In this paper, we proposed an adaptive redundant reservation strategy, which uses overlapping technique to implement reservation admission and enable resource providers dynamically determine the redundant degree at runtime. By overlapping a new reservation with an existing one, a request whose reservation requirements can not be satisfied in traditional way might be accepted. Also, by dynamically determining the redundant degree, our strategy can obtain optimal tradeoff between performance and reliability for distributed high-performance computing systems. Experimental results show that the strategy can bring about remarkably higher resource utilization and lower rejection rate when using redundant reservation service at the price of a slightly increasing of reservation violations

    Influence Maximization based on Threshold Model in Hypergraph

    Full text link
    Node centrality problem has been actively and deeply explored in recent years thanks to the application of the node influence maximization problem in product recommendation, public opinion dissemination, disease propagation, and other aspects. This paper mainly studies the problem of node influence maximization based on threshold model in hypergraph. For the first time, we extend Message Passing method from ordinary graph to hypergraph to describe the process of information passing in hypergraph. We determine the index of high-order collective inflence(HCI) value to assess the influence of the node and propose the high-order collective influence based on threshlod model(HCI-TM) algorithm through the study of the self-satisfying equation. In comparison to other algorithms, the HCI-TM algorithm may maximize both the node activation scale and the hyperedge activation scale when a particular percentage of seed nodes is chosen. Finally, numerical simulation on generated networks and real networks are used to demonstrate the superiority of the HCI-TM algorith.Comment: 14 pages, 6 figure

    Adaptive Neural Network Approach for a Class of Uncertain Non-affine Nonlinear Systems

    No full text
    The paper proposes a new output feedback adaptive tracking control scheme using neural network for a class of uncertain non-affine nonlinear systems that only the system output variables can be measured. The scheme adopts low-pass filter to transform non-affine nonlinear systems into affine in the pseudo-input dynamics. No state observer is employed and few adapting parameters to be tuned and Lipschiz assumption, SPR condition are not required. Only the output error is used in control laws and weights update laws which make the system construct simple. Boundedness for the output tracking error and all states in the closed-loop system are guaranteed, and simulation results have verified the effectiveness of the proposed approach

    Video Object Matching Based on SIFT and Rotation Invariant LBP

    No full text
    Object detection and tracking is an essential preliminary task in event analysis systems (e.g. Visual surveillance).Typically objects are extracted and tagged, forming representative tracks of their activity. Tagging is usually performed by probabilistic data association. However, as data may have been collected at different times or in different locations, it is often impossible to establish such associations in systems capturing disjoint areas. In this case, appearance matching is a valuable aid. This paper proposes a object matching method for multi-camera by combining HOG and block LBP, and computes accuracy rate by SVM. Using independent tracks of 30 different persons, we show that the proposed representation effectively discriminates visual object and that it presents high resilience to incorrect object segmentation and illumination. Experimental results show that the average accuracy DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.341

    MD3 Model Loading in Game

    No full text
    corecore