To measure implicit relationships between two objects on the Wikipedia information network. The relationship is a more general concept than similarity, we discuss existing methods for measuring either relationships or similarities. A keyword has grown in this decade, while knowledge search has recently been researched to obtain knowledge of a single object and relationships between […]
Multi message dissemination over static and Mobile networks
A simple distributed gossip-style protocol that achieves near-optimal spreading rate for multimessage dissemination, with the assistance of mobility. The key observation is that random gossiping over static geometric graphs is inherently constrained by the expansion property of the underlying graph – capacity loss occurs since the copies are spatially constrained instead of being spread out. […]
Autoregressive Moving Average Model
Mobile social networks as emerging social communication platforms have attracted great attention recently, and their mobile applications have been developed and implemented pervasively. In mobile social networking applications, profile matching acts as a critical initial step to help users, especially strangers, initialize conversation with each other in a distributed manner. Introduced a distributed mobile communication […]
Group key management (GKM) in mobile communication
The most important concerns is how to minimize the communication overhead when the shared GK is updated among the subscribers. Treebased KM, one class of GKM, has received considerable attention from many researchers since the amount of overhead for group rekeying is proportional to the logarithm of the group size. Many researchers have proposed new […]
EAACK is an acknowledgment-based IDS
The approach described in this research paper is based on our previous work, where the backbone of EAACK was proposed and evaluated through implementation. Extend it with the introduction of digital signature to prevent the attacker from forging acknowledgment packets. EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report […]
Good rate of convergence with a guaranteed empirical risk minimization
The input data are not generated by an external source. The points at which the unknown function is observed need to be chosen by some specific algorithm. This last condition can be found in applications, among others, from neural networks, robotics, optimal control, and statistics. The case where kernel-based local models are employed for the […]
Website Structure Improvement through Facilitating Effective User Navigation
A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the completely reorganized new structure can be highly unpredictable, and the cost of disorienting […]