Showing 141 - 160 results of 241 for search '"data structures"', query time: 0.07s Refine Results
  1. 141

    Anomaly detection in backbone networks using Filter-ary-Sketch by ZHENG Li-ming1, ZOU Peng2, HAN Wei-hong1, LI Ai-ping1, JIA Yan1

    Published 2011-01-01
    “…For the special requirements of anomaly detection in backbone networks,an anomaly detection method was proposed based in the summary data structure: Filter-ary-Sketch.It recorded the network traffic information in Fil-ter-are-Sketch online and detected anomalies based on multi-dimensional entropy at every circle.If an anomaly was detected,the anomaly point located according to data stream recorded in Filter-ary-Sketch.Finally,malicious traffic blocked using the source IPs recorded in Bloom filter.The method was effective in detecting a variety of network at-tacks;especially it could block the malicious traffic.Evaluated by the experiment,the method can detect anomaly in the backbone network with small computing and memory resource and block the IP flows that are responsible for the anomaly.…”
    Get full text
    Article
  2. 142

    Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV by Zhi REN, Cong CHEN, Ya-nan CAO, Chen PENG, Qian-bin CHEN

    Published 2014-10-01
    “…A novel routing algorithm,LRPI (low-overhead routing with piggybacked immunity information) was proposed.LRPI contains the following four new mechanisms:piggybacking the immune information with SV(summary vectors),fast generation of the immune information through a cross-layer method,an improved exchange mechanism of SV,and adaptive compression of SV.Based on the above new mechanism,LRPI not only avoids using special data structure but also can achieve the same immune function more quickly.Theoretical analysis and simulation results show that LRPI outperforms the classical epidemic routing algorithm and a few of its improvements in terms of control overhead,the number of saved packets,and average end-to-end delay.…”
    Get full text
    Article
  3. 143

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  4. 144

    High-performance and high-concurrency encryption scheme for Hadoop platform by Wei JIN, Mingjie YU, Fenghua LI, Zhengkun YANG, Kui GENG

    Published 2019-12-01
    “…,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect data stored in Hadoop effectively,a high-performance encryption and key management scheme for Hadoop was proposed.Firstly,a three-level key management system was extended with the domestic commercial cipher algorithm.Then,a new data structure for encryption zone key to reduce time consumption was designed.Finally,the computing process of data stream in parallel was scheduled.The experimental results show that compared with the existing Hadoop schemes,the proposed scheme can improve the efficiency of key management,and can speed up file encryption.…”
    Get full text
    Article
  5. 145

    The Impact of KLT Coder on the Image Distortion in Astronomy by Petr Pata

    Published 2015-01-01
    “…These results are promising and show the novel approach to the design of lossy image compression algorithms and also suitability for algorithms of image data structuring for retrieving, transfer, and distribution.…”
    Get full text
    Article
  6. 146

    THE IMPACT OF NORMALIZATION PROCEDURES ON THE CLASSIFICATION OF BUILDING MATERIALS COMPANIES LISTED ON THE WARSAW STOCK EXCHANGE

    Published 2017-12-01
    “…The conducted study shows that the use of different normalization formulas of variables can cause the change of the results of the companies classification, which does not result neither from the data structure change nor the effectiveness modification of their operations.…”
    Get full text
    Article
  7. 147

    Outlier detection algorithm based on fast density peak clustering outlier factor by Zhongping ZHANG, Sen LI, Weixiong LIU, Shuxia LIU

    Published 2022-10-01
    “…For the problem that peak density clustering algorithm requires human set parameters and high time complexity, an outlier detection algorithm based on fast density peak clustering outlier factor was proposed.Firstly, k nearest neighbors algorithm was used to replace the density peak of density estimate, which adopted the KD-Tree index data structure calculation of k close neighbors of data objects, and then the way of the product of density and distance was adopted to automatic selection of clustering centers.In addition, the centripetal relative distance and fast density peak clustering outliers were defined to describe the degree of outliers of data objects.Experiments on artificial data sets and real data sets were carried out to verify the algorithm, and compared with some classical and novel algorithms.The validity and time efficiency of the proposed algorithm are verified.…”
    Get full text
    Article
  8. 148

    Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter by Shyamala Loganathan, Saswati Mukherjee

    Published 2015-01-01
    “…This research reports on an efficient data structure for resource management and resource scheduling technique in a private cloud environment and discusses a cloud model. …”
    Get full text
    Article
  9. 149

    FAULT DIAGNOSIS BASED ON MIXED LABEL INFORMATION LOCALITY PRESERVING PROJECTIONS DIMENSION REDUCTION by YUAN LongYin, ZHANG QianTu, LEI Jing, WU ShengCai

    Published 2019-01-01
    “…The similarity matrix is used to preserve the local structure of the same-label samples before and after dimension reduction, whereas the divergence matrix is used to enlarge the distance between the different-label samples after dimension reduction. As a result, data structure is retained effectively, better low dimension structure can be obtained, and higher fault diagnosis accuracy can achieved. …”
    Get full text
    Article
  10. 150

    Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey by Ripon Patgiri, Sabuzima Nayak, Samir Kumar Borgohain

    Published 2019-01-01
    “…Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns “true” or “false” with an error tolerance depending on the presence of the element in the set. …”
    Get full text
    Article
  11. 151

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  12. 152

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  13. 153

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  14. 154

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  15. 155

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  16. 156

    Research on the Digital Design of Gear Transmission Scheme by Wei Shan, Lianji Wang, Yali Ma, Guangjian Wang

    Published 2021-11-01
    “…The knowledge unit database of the gear transmission scheme is established and transformed into the corresponding data structure. The solution of hybrid combination schemes of knowledge units is implemented by considering the series-parallel combination of knowledge units. …”
    Get full text
    Article
  17. 157

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  18. 158

    Security Management Technology of Multilayer Satellite Internet Based on Blockchain by Ruijie ZHU, Yudong ZHANG, Yating WEI, Chao XI

    Published 2022-03-01
    “…Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite internet and ground network, the channel opening and node exposure of satellite internet will pose a security threat to network access and resource management.Aiming at the security problem of satellite internet, a multilayer satellite internet security management architecture based on blockchain was proposed.As a distributed ledger technology, blockchain uses chain data structure to verify and store data, and adopts encryption methods to maintain that data blocks cannot be tampered.Blockchain can realize network security access, trusted resource management, and provide information security protection for satellite internet.This paper improved the security of satellite internet by integrating blockchain technology with satellite internet.…”
    Get full text
    Article
  19. 159

    Research and implementation on acquisition scheme of telecom big data based on Hadoop by Baoyou WANG, Jing QIAN, Shijin YUAN

    Published 2017-01-01
    “…ETL is a very important step in the implementation process of data warehouse.A good ETL flow is important,which can effectively process the telecom big data and improve the acquisition efficiency of the operation platform.Firstly,the main data content of the big data platform was expounded.Secondly,in order to improve the efficiency of massive data collection,Hadoop and Oracle mashup solution was suggested.Subsequently,a dynamic triggered ETL scheduling flow and algorithm was proposed.Compared with timer start ETL scheduling method,it could effectively shorten waiting time and avoid the phenomenon of resources to seize and congestion.Finally,according to the running log of Hadoop platform and Oracle database,the relationship between acquisition efficiency and data quantity was analyzed comparatively.Furthermore,practice result shows that the hybrid data structure of the big data platform complement each other and can effectively enhance the timeliness of data collection and access better application effect.…”
    Get full text
    Article
  20. 160

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. The data structure of encrypted block is generated by using consortium blockchain technology and updating homomorphic encryption technology to realize the updating encryption algorithm of privacy big data. …”
    Get full text
    Article